Episode
125: Jeremiah
Description
Jeremiah Roe is a seasoned penetration tester. In this episode he tells us about a time when he had to break into a building to prove it wasn’t as secure as the company thought. You can catch more of Jeremiah on the We’re In podcast. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. Create your free account at snyk.co/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
A man recounts how he broke into Buckingham Palace by climbing a drainpipe and entering through an open window, describing his experience exploring the palace before eventually getting caught.
00:00 - 01:39 (01:39)
Summary
A man recounts how he broke into Buckingham Palace by climbing a drainpipe and entering through an open window, describing his experience exploring the palace before eventually getting caught.
Episode125: Jeremiah
PodcastDarknet Diaries
An individual shares a story about a man who ran out of gas, got arrested, and stole a car in an attempt to find his wife and kids.
01:39 - 05:03 (03:23)
Summary
An individual shares a story about a man who ran out of gas, got arrested, and stole a car in an attempt to find his wife and kids.
Episode125: Jeremiah
PodcastDarknet Diaries
A man recalls his experience of stumbling upon the Queen's bedroom and discusses the speculation surrounding the room's history.
05:03 - 08:31 (03:27)
Summary
A man recalls his experience of stumbling upon the Queen's bedroom and discusses the speculation surrounding the room's history.
Episode125: Jeremiah
PodcastDarknet Diaries
The importance of physical penetration testing is highlighted as they can identify vulnerabilities that someone might use to get in.
08:35 - 14:43 (06:08)
Summary
The importance of physical penetration testing is highlighted as they can identify vulnerabilities that someone might use to get in. This approach is particularly beneficial for government contractors, who may not have the same level of security as the government itself but still need to safeguard sensitive information.
Episode125: Jeremiah
PodcastDarknet Diaries
Penetration testing is important for big businesses and government contractors to identify security holes and vulnerabilities that could be used by malicious actors to gain access and steal sensitive information.
14:43 - 20:37 (05:53)
Summary
Penetration testing is important for big businesses and government contractors to identify security holes and vulnerabilities that could be used by malicious actors to gain access and steal sensitive information. Without this kind of testing, organizations may not be aware of these weaknesses and potentially leave themselves open to cyber attacks.
Episode125: Jeremiah
PodcastDarknet Diaries
A team of explorers take photos and investigate the external egress points, perimeter, floors, and office areas of an abandoned building to see what they could find.
20:37 - 29:52 (09:15)
Summary
A team of explorers take photos and investigate the external egress points, perimeter, floors, and office areas of an abandoned building to see what they could find.
Episode125: Jeremiah
PodcastDarknet Diaries
The vulnerability of lobby kiosk computers that can be accessed and controlled by anyone was demonstrated.
29:52 - 35:22 (05:30)
Summary
The vulnerability of lobby kiosk computers that can be accessed and controlled by anyone was demonstrated. A Bash Bunny USB device that appears normal but actually allows access and control of the computer it is inserted into was also mentioned.
Episode125: Jeremiah
PodcastDarknet Diaries
NAC is a security feature used by routers that control access to a network based on the MAC address of the device.
35:22 - 42:04 (06:41)
Summary
NAC is a security feature used by routers that control access to a network based on the MAC address of the device. It prevents unauthorized devices from gaining full access to the network.
Episode125: Jeremiah
PodcastDarknet Diaries
The speaker follows an individual in an office building to assess their security infrastructure, noting exposed network ports and employees who left their computers unlocked.
42:04 - 50:14 (08:10)
Summary
The speaker follows an individual in an office building to assess their security infrastructure, noting exposed network ports and employees who left their computers unlocked. They also take photos of whiteboards, paperwork, and file names to help determine the sensitivity of the information found.
Episode125: Jeremiah
PodcastDarknet Diaries
Jeremiah's experience with social engineering, spear phishing, and physical penetration testing allowed him to break into a restricted area physically.
50:14 - 51:27 (01:12)
Summary
Jeremiah's experience with social engineering, spear phishing, and physical penetration testing allowed him to break into a restricted area physically. His skills impressed the company and secured further work for him.