Episode
69: Human Hacker
Description
We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, security consultant and master social engineer, Christopher Hadnagy, joins us to share his stories and wisdom. He describes what it was like to be a social engineer before the world knew what social engineering was and tells some of his amazing stories from his long career in penetration testing. A big thanks to Christopher Hadnagy from social-engineer.org for sharing his stories with us. Check out his book Social Engineering: The Science of Human Hacking, affiliate link here. Check out his podcast called The Social-Engineer podcast. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial. Sources https://www.social-engineer.org/ How phishing scammers manipulate your amygdala and oxytocin TEDxFultonStreet DEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SE https://en.wikipedia.org/wiki/George_C._Parker Book Recommendations with affiliate links: Social Engineering Influence What Every Body is Saying Emotions Revealed Presence It’s Not About “Me”, Top 10 Techniques for Building Rapport Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
The story of how a man in the early 20th century duped people into believing he was the grandson of Ulysses S. Grant and convinced them to invest in a non-existent family crypt in New York City.
00:00 - 02:25 (02:25)
Summary
The story of how a man in the early 20th century duped people into believing he was the grandson of Ulysses S. Grant and convinced them to invest in a non-existent family crypt in New York City.
Episode69: Human Hacker
PodcastDarknet Diaries
Chris Hadnagy, the CEO of Social Engineer LLC, discusses how he found his niche in the field of pen testing and how he focuses on people, talking to them and learning how to influence them.
02:25 - 09:01 (06:36)
Summary
Chris Hadnagy, the CEO of Social Engineer LLC, discusses how he found his niche in the field of pen testing and how he focuses on people, talking to them and learning how to influence them.
Episode69: Human Hacker
PodcastDarknet Diaries
Social engineering, phishing and vishing attacks have become increasingly common with the rise of remote work.
09:01 - 14:45 (05:44)
Summary
Social engineering, phishing and vishing attacks have become increasingly common with the rise of remote work. Such attacks can be prevented by testing and conducting phishing simulations to identify weak spots within systems and security measures.
Episode69: Human Hacker
PodcastDarknet Diaries
Conducting phishing campaigns on employees to improve security is important.
14:45 - 21:12 (06:26)
Summary
Conducting phishing campaigns on employees to improve security is important. However, it is equally important to incentivize healthy behaviors to incentivize good security practices.
Episode69: Human Hacker
PodcastDarknet Diaries
Two individuals easily bypass bank security by walking through the front doors and up the stairs, despite the presence of security guards and metal detectors.
21:12 - 26:52 (05:39)
Summary
Two individuals easily bypass bank security by walking through the front doors and up the stairs, despite the presence of security guards and metal detectors.
Episode69: Human Hacker
PodcastDarknet Diaries
The speaker narrates a story of how he made a woman believe he wasn't watching as she typed her computer password, but he was recording it on his phone for an unknown reason.
26:52 - 31:30 (04:37)
Summary
The speaker narrates a story of how he made a woman believe he wasn't watching as she typed her computer password, but he was recording it on his phone for an unknown reason.
Episode69: Human Hacker
PodcastDarknet Diaries
Two robbers share a close call during a bank heist in which they weren't sure if they were going to get caught.
31:30 - 36:03 (04:33)
Summary
Two robbers share a close call during a bank heist in which they weren't sure if they were going to get caught.
Episode69: Human Hacker
PodcastDarknet Diaries
The speaker shares how he and his team used social engineering to infiltrate a bank's security system by pretending to be auditors, making fake phone calls to employees, and even using a voice double to deceive the security guards.
36:03 - 41:01 (04:57)
Summary
The speaker shares how he and his team used social engineering to infiltrate a bank's security system by pretending to be auditors, making fake phone calls to employees, and even using a voice double to deceive the security guards.
Episode69: Human Hacker
PodcastDarknet Diaries
A person recounts a time when they were in a car with a person who was holding a gun and feeling pressure to stay while being uncomfortable.
41:01 - 49:05 (08:04)
Summary
A person recounts a time when they were in a car with a person who was holding a gun and feeling pressure to stay while being uncomfortable.
Episode69: Human Hacker
PodcastDarknet Diaries
While attempting to run a malware scam on individuals who fell for a raffle that promised iPhone prizes, two pen testers were arrested after security guards discovered them.
49:05 - 54:54 (05:48)
Summary
While attempting to run a malware scam on individuals who fell for a raffle that promised iPhone prizes, two pen testers were arrested after security guards discovered them. The incident sparked a conversation about the importance and ethics of pen testing.
Episode69: Human Hacker
PodcastDarknet Diaries
Learn about the necessary security measures for building networks including firewalls and intrusion detection systems, and how to clean up residual mess from compromised websites.
54:54 - 59:05 (04:10)
Summary
Learn about the necessary security measures for building networks including firewalls and intrusion detection systems, and how to clean up residual mess from compromised websites.
Episode69: Human Hacker
PodcastDarknet Diaries
The speaker recommends the book "Social Engineering the Science of Human Hacking" by Chris and "Influence" by Cialdury for those interested in learning about social engineering techniques.
59:05 - 1:03:35 (04:29)
Summary
The speaker recommends the book "Social Engineering the Science of Human Hacking" by Chris and "Influence" by Cialdury for those interested in learning about social engineering techniques.
Episode69: Human Hacker
PodcastDarknet Diaries
The speaker shares a personal experience of falling victim to a phishing scam due to stress and lack of critical thinking, despite multiple warning signs.
1:03:35 - 1:07:53 (04:18)
Summary
The speaker shares a personal experience of falling victim to a phishing scam due to stress and lack of critical thinking, despite multiple warning signs. The episode ends with a reminder to support the show via Patreon.