In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.SponsorsSupport for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.
Discover more and add this to your library.
In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.SponsorsSupport for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.
The episode kicks off with an engaging recounting of some daring scams executed by Victor Lustig, a notorious con artist in the early 1900s. Lustig's most infamous scams included convincing banks to accept phony bonds and misleading scrap metal dealers into purchasing the Eiffel Tower under the guise of a government project. His tactics exemplified his knack for persuasion and manipulation, which allowed him to deceive banks and businesses into believing in his manufactured authority. The stories reflect not only Lustig's cunning but also the historical context of his scams, illustrating how he operated in a time when trust in institutions was high.
The episode pivotality shifts to a guest known as EvilMog, who shares his experiences troubleshooting networks in Afghanistan while stationed there. His narrative captures the challenges faced in a war zone, detailing the delicate nature of maintaining communication systems amidst the chaos. He describes how critical his role was in ensuring soldiers could contact their families, often amidst formidable and dangerous situations—such as repairing equipment during rocket attacks. This segment delves into the human side of a military technician's job, emphasizing compassion and emergency problem-solving, revealing a profound impact on soldiers' morale.
The podcast also features Joe, a penetration tester, who shares an incident during a simulated breach on a bank's network. A junior tester inadvertently took down the bank's network using a tool called Masscan, which overwhelmed the system. Joe highlights the importance of communication skills in his line of work and the substantial responsibility of pen testers to understand the ramifications of their actions. Joe’s story not only provides insight into the technical aspects of pen testing but also underscores the need for careful execution and the critical role of effective communication during crisis moments.