goodlisten

Episode

Ep 36: Jeremy from Marketing
listen on Spotify
1:04:14
Published: Tue Apr 16 2019
Description

A company hires a penetration tester to pose as a new hire, Jeremy from Marketing, to see how much he can hack into in his first week on the job. It doesn't go as planned. Thanks to @TinkerSec for telling us this story. This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code "DARKNET". This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. For more show notes visit https://darknetdiaries.com/episode/36. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Chapters
The terms red team and blue team are borrowed from military drills with attackers and defenders.
00:00 - 01:21 (01:21)
listen on Spotify
Cybersecurity
Summary

The terms red team and blue team are borrowed from military drills with attackers and defenders. The blue team is responsible for defense and often works on locking things down and hardening systems.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
Go behind the scenes with a penetration tester to see how they attempt to hack into a company's network and obtain sensitive information, even in cases where the company believes its defense is impenetrable.
01:21 - 07:03 (05:41)
listen on Spotify
Penetration testing
Summary

Go behind the scenes with a penetration tester to see how they attempt to hack into a company's network and obtain sensitive information, even in cases where the company believes its defense is impenetrable.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
A highly trained hacker joins the marketing team and sets out to see how much he can hack into the company's network in his first week on the job.
07:03 - 12:25 (05:22)
listen on Spotify
Cybersecurity
Summary

A highly trained hacker joins the marketing team and sets out to see how much he can hack into the company's network in his first week on the job. The team remains unaware of his true identity and intentions.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
A cybersecurity expert shares his insights on how to approach cybersecurity attacks by observing the environment and understanding what's going around before deciding on the best course of action.
12:25 - 21:03 (08:37)
listen on Spotify
Cybersecurity
Summary

A cybersecurity expert shares his insights on how to approach cybersecurity attacks by observing the environment and understanding what's going around before deciding on the best course of action. Known vulnerabilities and IT team best practices are just some of the low-hanging fruit that hackers often take advantage of.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The podcast discusses various techniques used by hackers to crack passwords and gain unauthorized access to computers and networks.
21:03 - 29:05 (08:02)
listen on Spotify
Cybersecurity
Summary

The podcast discusses various techniques used by hackers to crack passwords and gain unauthorized access to computers and networks.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The speaker discusses the weak security measures in a company's network, including the lack of remote logins for users and the requirement for 12-character passphrases.
29:05 - 34:47 (05:41)
listen on Spotify
security
Summary

The speaker discusses the weak security measures in a company's network, including the lack of remote logins for users and the requirement for 12-character passphrases. They also mention an email about the implementation of multi-factor authentication in email, indicating steps to improve security.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
In this podcast episode, the speaker describes how they successfully bypassed multi-factor authentication using a social engineering hack, after cracking the user's password and gaining access to their email account.
34:47 - 39:18 (04:30)
listen on Spotify
Cybersecurity
Summary

In this podcast episode, the speaker describes how they successfully bypassed multi-factor authentication using a social engineering hack, after cracking the user's password and gaining access to their email account.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
Learn how opening your mouth slightly can improve your ability to listen effectively and how projecting confidence can help you lead a team successfully.
39:18 - 43:46 (04:27)
listen on Spotify
Listening, Confidence
Summary

Learn how opening your mouth slightly can improve your ability to listen effectively and how projecting confidence can help you lead a team successfully.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The vulnerability of weak passwords, demonstrated through a real-life example of how a hacker was able to gain access to multiple laptops using a simple password.
43:46 - 50:24 (06:38)
listen on Spotify
Cybersecurity
Summary

The vulnerability of weak passwords, demonstrated through a real-life example of how a hacker was able to gain access to multiple laptops using a simple password.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The vulnerability with service paths on Windows can allow malicious programs to run at startup, but only if the folder path has spaces in it.
50:24 - 55:20 (04:56)
listen on Spotify
Windows Vulnerability
Summary

The vulnerability with service paths on Windows can allow malicious programs to run at startup, but only if the folder path has spaces in it. In order for the exploit to work, the attacker must have read and write permissions to the remote computer in question.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The speaker describes the process of a remote access hack in which he gains control of a finance worker's computer by dropping malware into a folder and waiting for her to log back in.
55:20 - 57:59 (02:38)
listen on Spotify
Cybersecurity
Summary

The speaker describes the process of a remote access hack in which he gains control of a finance worker's computer by dropping malware into a folder and waiting for her to log back in.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The speaker conducted a security assessment on a company and was able to find several vulnerabilities such as an easy password on LocLib and clear text credentials.
57:59 - 1:03:27 (05:28)
listen on Spotify
Security Assessment
Summary

The speaker conducted a security assessment on a company and was able to find several vulnerabilities such as an easy password on LocLib and clear text credentials.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The speaker thanks the Dallas hackers association after a story about pen testing by Tinkert and a voice intro from Proximity Sound.
1:03:27 - 1:04:19 (00:52)
listen on Spotify
Cybersecurity
Summary

The speaker thanks the Dallas hackers association after a story about pen testing by Tinkert and a voice intro from Proximity Sound. The show will be going through a rebrand soon with new merchandise.

Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries