Episode
Ep 36: Jeremy from Marketing
Description
A company hires a penetration tester to pose as a new hire, Jeremy from Marketing, to see how much he can hack into in his first week on the job. It doesn't go as planned. Thanks to @TinkerSec for telling us this story. This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code "DARKNET". This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. For more show notes visit https://darknetdiaries.com/episode/36. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
The terms red team and blue team are borrowed from military drills with attackers and defenders.
00:00 - 01:21 (01:21)
Summary
The terms red team and blue team are borrowed from military drills with attackers and defenders. The blue team is responsible for defense and often works on locking things down and hardening systems.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
Go behind the scenes with a penetration tester to see how they attempt to hack into a company's network and obtain sensitive information, even in cases where the company believes its defense is impenetrable.
01:21 - 07:03 (05:41)
Summary
Go behind the scenes with a penetration tester to see how they attempt to hack into a company's network and obtain sensitive information, even in cases where the company believes its defense is impenetrable.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
A highly trained hacker joins the marketing team and sets out to see how much he can hack into the company's network in his first week on the job.
07:03 - 12:25 (05:22)
Summary
A highly trained hacker joins the marketing team and sets out to see how much he can hack into the company's network in his first week on the job. The team remains unaware of his true identity and intentions.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
A cybersecurity expert shares his insights on how to approach cybersecurity attacks by observing the environment and understanding what's going around before deciding on the best course of action.
12:25 - 21:03 (08:37)
Summary
A cybersecurity expert shares his insights on how to approach cybersecurity attacks by observing the environment and understanding what's going around before deciding on the best course of action. Known vulnerabilities and IT team best practices are just some of the low-hanging fruit that hackers often take advantage of.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
The podcast discusses various techniques used by hackers to crack passwords and gain unauthorized access to computers and networks.
21:03 - 29:05 (08:02)
Summary
The podcast discusses various techniques used by hackers to crack passwords and gain unauthorized access to computers and networks.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
The speaker discusses the weak security measures in a company's network, including the lack of remote logins for users and the requirement for 12-character passphrases.
29:05 - 34:47 (05:41)
Summary
The speaker discusses the weak security measures in a company's network, including the lack of remote logins for users and the requirement for 12-character passphrases. They also mention an email about the implementation of multi-factor authentication in email, indicating steps to improve security.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
In this podcast episode, the speaker describes how they successfully bypassed multi-factor authentication using a social engineering hack, after cracking the user's password and gaining access to their email account.
34:47 - 39:18 (04:30)
Summary
In this podcast episode, the speaker describes how they successfully bypassed multi-factor authentication using a social engineering hack, after cracking the user's password and gaining access to their email account.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
Learn how opening your mouth slightly can improve your ability to listen effectively and how projecting confidence can help you lead a team successfully.
39:18 - 43:46 (04:27)
Summary
Learn how opening your mouth slightly can improve your ability to listen effectively and how projecting confidence can help you lead a team successfully.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
The vulnerability of weak passwords, demonstrated through a real-life example of how a hacker was able to gain access to multiple laptops using a simple password.
43:46 - 50:24 (06:38)
Summary
The vulnerability of weak passwords, demonstrated through a real-life example of how a hacker was able to gain access to multiple laptops using a simple password.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
The vulnerability with service paths on Windows can allow malicious programs to run at startup, but only if the folder path has spaces in it.
50:24 - 55:20 (04:56)
Summary
The vulnerability with service paths on Windows can allow malicious programs to run at startup, but only if the folder path has spaces in it. In order for the exploit to work, the attacker must have read and write permissions to the remote computer in question.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
The speaker describes the process of a remote access hack in which he gains control of a finance worker's computer by dropping malware into a folder and waiting for her to log back in.
55:20 - 57:59 (02:38)
Summary
The speaker describes the process of a remote access hack in which he gains control of a finance worker's computer by dropping malware into a folder and waiting for her to log back in.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
The speaker conducted a security assessment on a company and was able to find several vulnerabilities such as an easy password on LocLib and clear text credentials.
57:59 - 1:03:27 (05:28)
Summary
The speaker conducted a security assessment on a company and was able to find several vulnerabilities such as an easy password on LocLib and clear text credentials.
EpisodeEp 36: Jeremy from Marketing
PodcastDarknet Diaries
The speaker thanks the Dallas hackers association after a story about pen testing by Tinkert and a voice intro from Proximity Sound.
1:03:27 - 1:04:19 (00:52)
Summary
The speaker thanks the Dallas hackers association after a story about pen testing by Tinkert and a voice intro from Proximity Sound. The show will be going through a rebrand soon with new merchandise.