David Bombal

#568: 5-Minute Cyber Hacks Everyone Should Know (2026)

Mar 31, 2026
Rayton Li, Linux security expert who demos sudo misconfigurations and quick root tricks. David Smith, Windows specialist showing Alternate Data Streams for hiding executables. Jacob Meyer, researcher revealing LNK shortcut hijacks and LinkItUp. Kenneth Walker, red team operator abusing Steam profiles as C2. Alex Benton, practitioner demonstrating the Sticky Keys rename exploit and defenses.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Use Recovery Mode To Replace Sticky Keys For Admin Shell

  • Replace system accessibility executables with safe backups to regain access when locked out.
  • Alex Benton demonstrated renaming utilman.exe (Sticky Keys) and replacing it with cmd.exe in WinRE to spawn an admin shell without a password.
INSIGHT

Hiding C2 Traffic In Legitimate Steam Profiles

  • Public platforms can act as resilient, innocuous C2 channels that blend into normal traffic.
  • Kenneth Walker showed a PowerShell agent polling a Steam profile for commands and returning output to a Netcat listener for persistent control.
INSIGHT

Shortcut Files Can Hide A Different Hidden Target

  • LNK files separate visible target text from embedded execution metadata, enabling stealthy backdoors.
  • Jacob Meyer used LinkItUp to edit LNK binary fields so the shortcut shows Firefox while actually launching a PowerShell reverse shell.
Get the Snipd Podcast app to discover more snips from this episode
Get the app