Risky Business Video
February 24, 2025
Between Two Nerds: Hacking's First Principles
Presented by

Tom Uren
Policy & Intelligence

The Grugq
Independent Security Researcher
In this edition of Between Two Nerds Tom Uren and The Grugq examine the fundamental principles of network exploitation as described in Matthew Monte’s ‘Network Attacks and Exploitation: A Framework’ book.
Show notes:
- Network Attacks and Exploitation: A Framework (https://www.wiley.com/en-us/Network+Attacks+and+Exploitation%3A+A+Framework-p-9781118987124))
- Google’s Signal hacking report (https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger))
- Device code phishing (https://arstechnica.com/information-technology/2025/02/russian-spies-use-device-code-phishing-to-hijack-microsoft-accounts/))