Chapter

A Hacker in Marketing
listen on Spotify
07:03 - 12:25 (05:22)

A highly trained hacker joins the marketing team and sets out to see how much he can hack into the company's network in his first week on the job. The team remains unaware of his true identity and intentions.

Clips
Jeremy from marketing is actually a highly skilled hacker who is eager to exploit his access to company networks during his first week on the job.
07:03 - 08:30 (01:27)
listen on Spotify
Cybersecurity
Summary

Jeremy from marketing is actually a highly skilled hacker who is eager to exploit his access to company networks during his first week on the job. Employers must be cautious and thorough in their hiring processes to prevent insider threats.

Chapter
A Hacker in Marketing
Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The protagonist drives with the intention to carry out a cyber attack, but ends up at his new job in a marketing department where he's presented as a contractor.
08:30 - 09:26 (00:55)
listen on Spotify
Cybersecurity
Summary

The protagonist drives with the intention to carry out a cyber attack, but ends up at his new job in a marketing department where he's presented as a contractor.

Chapter
A Hacker in Marketing
Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The speaker talks about the moments when he started working at a company, bringing in only a Kali image burnt on a USB with the standard workstation image and beginning to understand how phishing emails work.
09:26 - 11:14 (01:47)
listen on Spotify
Phishing
Summary

The speaker talks about the moments when he started working at a company, bringing in only a Kali image burnt on a USB with the standard workstation image and beginning to understand how phishing emails work.

Chapter
A Hacker in Marketing
Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The speaker explains the process of gathering data by running standard Windows commands that spit out a ton of data such as a list of all usernames, admins, domains, and host names of all domain controllers, which can be compiled and used for potential future needs.
11:14 - 12:25 (01:11)
listen on Spotify
Data Collection
Summary

The speaker explains the process of gathering data by running standard Windows commands that spit out a ton of data such as a list of all usernames, admins, domains, and host names of all domain controllers, which can be compiled and used for potential future needs.

Chapter
A Hacker in Marketing
Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries