70 Folgen

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

Darknet Diaries Jack Rhysider

    • Technologie
    • 5.0, 22 Bewertungen

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

    69: Human Hacker

    69: Human Hacker

    We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, security consultant and master social engineer, Christopher Hadnagy, joins us to share his stories and wisdom. He describes what it was like to be a social engineer before the world knew what social engineering was and tells some of his amazing stories from his long career in penetration testing.
    A big thanks to Christopher Hadnagy from social-engineer.org for sharing his stories with us.
    Check out his book Social Engineering: The Science of Human Hacking, affiliate link here.
    Check out his podcast called The Social-Engineer podcast.
    Sponsors
    This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.
    Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.
    Sources

    https://www.social-engineer.org/

    How phishing scammers manipulate your amygdala and oxytocin TEDxFultonStreet

    DEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SE

    https://en.wikipedia.org/wiki/George_C._Parker


    Book Recommendations with affiliate links:

    Social Engineering

    Influence

    What Every Body is Saying

    Emotions Revealed

    Presence

    It’s Not About “Me”, Top 10 Techniques for Building Rapport



    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 1 Std. 6 Min.
    68: Triton

    68: Triton

    A mysterious mechanical failure one fateful night in a Saudi Arabian chemical plant leads a cast of operational technology researchers down a strange path towards an uncommon, but grave, threat. In this episode, we hear how these researchers discovered this threat and tried to identify who was responsible for the malware behind it. We also consider how this kind of attack may pose a threat to human life wherever there are manufacturing or public infrastructure facilities around the world.
    A big thanks to Julian Gutmanis, Naser Aldossary, Marina Krotofil, and Robert M. Lee for sharing their stories with us.
    Sponsors
    This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.
    This episode was sponsored by Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and when signing up with a new account use code darknet2020 to get a $20 credit on your next project.
    Sources

    https://www.fireeye.com/blog/threat-research/2019/04/triton-actor-ttp-profile-custom-attack-tools-detections.html

    https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html

    https://www.fireeye.com/blog/threat-research/2018/10/triton-attribution-russian-government-owned-lab-most-likely-built-tools.html

    https://dragos.com/wp-content/uploads/TRISIS-01.pdf

    Video S4 TRITON - Schneider Electric Analysis and Disclosure

    Video S4 TRITON - Mandiant Analysis at S4x18

    Video S4 TRITON - Reverse Engineering the Tricon Controller by Dragos

    Video S4 TRITON - A Report From The Trenches

    Video - Safety Orientation video for the Chemical Plant


    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 1 Std. 13 Min.
    67: The Big House

    67: The Big House

    John Strand is a penetration tester. He’s paid to break into computer networks and buildings to test their security. In this episode we listen to stories he has from doing this type of work.
    Thanks to John Strand for coming on the show and telling your story.
    Sponsors
    Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.
    Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.
    Sources

    How a Hacker’s Mom Broke Into a Prison—and the Warden’s Computer

    Video: How not to suck at pen testing John Strand

    Video: I Had My Mom Break Into Prison


    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 42 Min.
    66: freakyclown

    66: freakyclown

    Freakyclown is a physical penetration tester. His job is to break into buildings to test the security of the building. In this episode we hear stories of some of these missions he’s been on.
    Thanks to Freakyclown for coming on the show and telling your story.
    Sponsors
    This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.
    This episode was sponsored by Molekule, a new air purifier that completely destroys air pollutants to help you breath easier. https://molekule.com.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 55 Min.
    Presenting: The Jordan Harbinger Show featuring Jack Barsky former KGB Spy

    Presenting: The Jordan Harbinger Show featuring Jack Barsky former KGB Spy

    This week, while we are busy making a new episode of Darknet Diaries, so we are going to play for you an episode from another podcast we think you'll really like. It's called the Jordan Harbinger show. In this episode he interviews Jack Barsky, a former KGB spy.

    We had Jordan on this podcast once, episode 56. https://darknetdiaries.com/episode/56/

    Subscribe to the Jordan Harbinger show, wherever you listen to podcasts or at https://www.jordanharbinger.com/podcasts/
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 30 Min.
    65: PSYOP

    65: PSYOP

    PSYOP, or “Psychological Operations”, is something the US military has been doing to foreign audiences for decades. But what exactly is it? And what’s the difference between white, gray, and black PSYOP missions? We talk to PSYOP specialists to learn more.
    Thanks to Jon Nichols for telling us about this fascinating world.
    Sponsors
    Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial.
    Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.
    Sources

    https://www.democracynow.org/2006/3/24/the_psyops_war_a_look_at

    https://en.wikipedia.org/wiki/Lincoln_Group

    https://www.goarmy.com/careers-and-jobs/special-operations/psyop/psyop-mission.html#

    https://en.wikipedia.org/wiki/Operation_Wandering_Soul_(Vietnam_War)

    https://en.wikipedia.org/wiki/Torches_of_Freedom

    http://cgsc.contentdm.oclc.org/cdm/ref/collection/p16040coll3/id/182

    https://archive.org/details/PropagandaAudiobook/Propaganda+Chapter+01.mp3

    https://www.newsweek.com/us-military-gets-mysterious-and-false-text-message-evacuate-korean-peninsula-669875

    https://www.cbinsights.com/research/future-of-information-warfare/

    https://en.wikipedia.org/wiki/National_Defense_Authorization_Act_for_Fiscal_Year_2013#Smith%E2%80%93Mundt_Modernization_Act_of_2012

    Videos

    Vietnam War Ghost Audio Tape used in PSYOPS ‘Wandering Soul’

    Jon Nichols Part 0 - Unallocated Spaces Talk on Russian Propaganda

    Cyber-Influence: Cyberwar and Psychological Operations

    WWII Psych Ops

    MISO Marines broadcast important information to Afghans

    The War You Don’t See

    Edward L. Bernays interview, 1986-10-23

    As it fights two wars, the Pentagon is steadily and dramatically increasing money spent on propaganda


    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 1 Std. 13 Min.

Kundenrezensionen

5.0 von 5
22 Bewertungen

22 Bewertungen

Top‑Podcasts in Technologie

Zuhörer haben auch Folgendes abonniert: