goodlisten

Episode

Ep 42: Mini-Stories: Vol 2
listen on Spotify
57:15
Published: Tue Jul 09 2019
Description

Three stories in one episode. Listen in on one of Dave Kennedy's penetration tests he conducted where he got caught trying to gain entry into a datacenter. Listen to a network security engineer talk about the unexpected visitor found in his network and what he did about it. And listen to Dan Tentler talk about a wild and crazy engagement he did for a client. Guests A very special thanks to Dave Kennedy. Learn more about his company at trustedsec.com. Thank you Clay for sharing your story. Check out the WOPR Summit. Viss also brought an amazing story to share. Thank you too. Learn more about him at Phobos.io. I first heard Clay's story on the Getting Into Infosec Podcast. Thanks Ayman for finding him and bring that story to my attention. Sponsors This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo. This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn't be. Check them out at https://canary.tools. For more show notes and links check out darknetdiaries.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Chapters
The speaker shares their experience of setting up a file sharing website on a Raspberry Pi with advanced security measures such as an isolated network, firewall, intrusion detection system, and logging.
00:00 - 01:55 (01:55)
listen on Spotify
Raspberry Pi
Summary

The speaker shares their experience of setting up a file sharing website on a Raspberry Pi with advanced security measures such as an isolated network, firewall, intrusion detection system, and logging.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
While considering joining the military, a man encounters four Marines who appear unhappy.
01:55 - 06:46 (04:50)
listen on Spotify
Military
Summary

While considering joining the military, a man encounters four Marines who appear unhappy. This causes him to question his decision and ultimately leads him down a different career path as the VP of security for a Fortune 1000 company.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
The speaker describes sneaking into a store while pretending to be a regular customer and staying in the back for 20-30 minutes.
06:46 - 10:44 (03:58)
listen on Spotify
Sneaking
Summary

The speaker describes sneaking into a store while pretending to be a regular customer and staying in the back for 20-30 minutes.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
The speaker and his team attempted to gain access to a data center by following someone else in, but were denied and settled for using a conference room instead.
10:44 - 15:56 (05:12)
listen on Spotify
Data Center
Summary

The speaker and his team attempted to gain access to a data center by following someone else in, but were denied and settled for using a conference room instead.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
An IT security professional describes the various layers of security he encountered in a high-security data center, emphasizing the importance of improving data protection for customers through testing and constructive feedback.
15:56 - 20:43 (04:46)
listen on Spotify
Data Security
Summary

An IT security professional describes the various layers of security he encountered in a high-security data center, emphasizing the importance of improving data protection for customers through testing and constructive feedback. He also mentions the unsettling practice of creating counterfeit badges with a handheld printer to gain unauthorized access.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
IT worker, Clay, discusses the challenges of dealing with students installing bitcoin miners on university computers which consume a lot of processing power and cause issues for system administrators.
20:43 - 25:21 (04:38)
listen on Spotify
Bitcoin Mining
Summary

IT worker, Clay, discusses the challenges of dealing with students installing bitcoin miners on university computers which consume a lot of processing power and cause issues for system administrators.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
Learn about open ports, network security devices that inspect packets, and bash history investigation.
25:21 - 28:59 (03:37)
listen on Spotify
Network Security
Summary

Learn about open ports, network security devices that inspect packets, and bash history investigation.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
This transcript discusses the risks of allowing anyone to log in as root, particularly when it comes to security.
28:59 - 33:55 (04:56)
listen on Spotify
Security
Summary

This transcript discusses the risks of allowing anyone to log in as root, particularly when it comes to security. The dangers of having unknown users logged in as root are highlighted.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
The speaker describes a situation where they need to take down a database, change passwords, and look for evidence of any potential security breaches or back doors.
33:55 - 38:33 (04:37)
listen on Spotify
Database Security
Summary

The speaker describes a situation where they need to take down a database, change passwords, and look for evidence of any potential security breaches or back doors.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
Neglecting security measures such as cleaning up logs and history or having proper audit readiness can result in a devastating cyberattack.
38:35 - 44:17 (05:41)
listen on Spotify
Cybersecurity
Summary

Neglecting security measures such as cleaning up logs and history or having proper audit readiness can result in a devastating cyberattack. The consequences of which lead to a cycle of blaming and firing employees, hiring new ones, and repeating the same negligent behavior.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
A company's employees are nervous about being surveilled by their IT coworker who has a creepy reputation and they fear he's accessing their personal data.
44:17 - 48:06 (03:49)
listen on Spotify
Workplace Surveillance
Summary

A company's employees are nervous about being surveilled by their IT coworker who has a creepy reputation and they fear he's accessing their personal data. The company is now trying to find ways to dismiss him.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
An IT guy took his company's hosting and on-premise equipment to his garage for hosting and claimed his mortgage and utilities as business expenses.
48:06 - 56:07 (08:01)
listen on Spotify
IT ethics
Summary

An IT guy took his company's hosting and on-premise equipment to his garage for hosting and claimed his mortgage and utilities as business expenses. The FBI discovered his actions and the investigation uncovered many other problems in the company.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
A tale of incompetence, malfeasance and an expensive lesson in trust.
56:07 - 57:31 (01:23)
listen on Spotify
Cybersecurity
Summary

A tale of incompetence, malfeasance and an expensive lesson in trust. Dave Kennedy shares a story that shows how risky it can be giving high-level access to a single individual who has the keys to the Castle.

Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries