Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Three stories in one! In this episode we hear about a penetration test from Mubix that he'll never forget, a incident response from Robert M. Lee which completely stunned him, and a social engineering mission from Snow.<br><br>Podcast recommendation: <a href='http://moonshot.audio/'>Moonshot</a>.
39 min
127
Ep 21: Black Duck Eggs
Ira Winkler's specialty is assembling elite teams of special forces and intelligence officers to go after companies. Ira shares a story about a time he and his team broke into a global 5 company. A company so large that theft of intellictual property could result in billions of dollars of damage. <br><br>Ira's consulting company: <a href='http://www.securementem.com/'>Secure Mentum</a>.<br><br>His books: <a href='https://www.amazon.com/gp/product/0764584685/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=0764584685&linkCode=as2&tag=tunn01-20&linkId=8f8a26b3c5fe68e6c8913ceea8adb0f5'>Spies Among Us</a>, <a href='https://www.amazon.com/gp/product/0128093161/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=0128093161&linkCode=as2&tag=tunn01-20&linkId=ac08090c6d15b5ad2c77789fbcf50d56'>Advanced Persistent Security</a>, <a href='https://www.amazon.com/gp/product/0895263904/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=0895263904&linkCode=as2&tag=tunn01-20&linkId=63e40c57a8bf8f04f077f55d6ed21455'>Through the Eyes of the Enemy</a>.
28 min
128
Ep 20: mobman
Chances are, if you were downloading shady programs in the early 2000's, you were infected with malware he wrote called SubSeven. Hacking changed mobman's life. Hear how it happened by listening to this episode.<br><br>Image for this episode created by <a href='https://www.instagram.com/dr4w1ngluc4s/'>dr4w1ngluc4s</a>. Check out his Instagram to see some amazing artwork!<br><br> Check out the podcasts <a href='http://vansounds.org/'>Van Sounds</a> and <a href='https://www.truecrimeisland.com/'>True Crime Island</a>
46 min
129
Ep 19: Operation Aurora
In 2009, around Christmas time, something terrible was lurking in the network at Google. Google is the most popular website on the Internet. It’s so popular many people just think Google is the Internet. Google hires many of the most talented minds and has been online since the 90s. Hacking into Google is no easy task. There’s a team of security engineers who test and check all the configurations on the site before they go live. And Google has teams of security analysts and technicians watching the network 24/7 for attacks, intrusions, and suspicious activity. Security plays a very vital role at Google, and everything has to have the best protections. But this attack slipped past all that. Hackers had found their way into the network. They compromised numerous systems, burrowed their way into Google’s servers, and were trying to get to data they shouldn’t be allowed to have. Google detected this activity. And realized pretty quickly they were dealing with an attack more sophisticated than anything they’ve ever seen.<br><br>Podcast recommendation: <a href='https://www.20k.org/'>Twenty Thousand Hertz</a>
28 min
130
Ep 18: Jackpot
A man addicted to gambling finds a bug in a video poker machine that lets him win excessive amounts of money.
21 min
131
Ep 17: Finn
A 14-year-old kid who finds himself bored in class decides to hack someone's twitter account and ends up with more than he bargained for.
45 min
132
Ep 16: Eijah
In 2007, a hacker named Eijah got fed up with the way DRM prevented him from being able to play the content he paid for. He decided to fight back against the AACS and find a way to circumvent the DRM. By the time Eijah was done, his life wasn't the same.
35 min
133
Ep 15: Ill Tills
A major retailer was hacked. Their point of sales machines were riddled with malware. Listen to hear how digital forensics and incident responders handled the situation. What malware was found? Where was it found? How was it stopped? And most importantly, how much data was leaked?
33 min
134
Ep 14: #OpJustina
In 2013 a hospital was accused of conducting a medical kidnapping against a young girl name Justina. This enraged many people across the country, including members of anonymous. A DDOS attack was waged against the hospital.
25 min
135
Ep 13: Carna Botnet
In 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerable in the book. And the data that came out of it was amazing.
33 min
136
Ep 12: Crypto Wars
In the 1990's the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be used online. A few brave people stood up to the government in the name of civil rights and won the right to use strong encryption. Listen to their battle and what they had to do through to accomplish this.
28 min
137
Ep 11: Strictly Confidential
What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result.
19 min
138
Ep 10: Misadventures of a Nation State Actor
In today's world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exactly how it's done.
33 min
139
Ep 9: The Rise and Fall of Mt. Gox
Mt. Gox was the largest bitcoin exchange in the world. It suddenly went offline. What happened?
28 min
140
Ep 8: Manfred (Part 2)
Manfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual goods and currency for real money. This was his full time job. Listen to this episode to hear exactly how he did this.
28 min
141
Ep 7: Manfred (Part 1)
Manfred has had the most epic story of all online video game stories. For the last 20 years, he's been hacking online games.
23 min
142
Ep 6: The Beirut Bank Job
Jayson E. Street tells us a story about the time he broke into a bank in Beirut Lebanon.
29 min
143
Ep 5: #ASUSGATE
Security researcher Kyle Lovett bought a new Asus router in 2013. He found it was riddled with security vulnerabilties. He set out on a mission to resolve these vulnerabilities not only for his own router, but for thousands of others who were also vulnerable.
25 min
144
Ep 4: Panic! at the TalkTalk Board Room
Mobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metropolitan Police investigate the breach. We get a rare glimpse of how the CEO handles the crisis.
38 min
145
Ep 3: DigiNotar, You are the Weakest Link, Good...
The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached.
25 min
146
Ep 2: The Peculiar Case of the VTech Hacker
VTech makes toy tablets, laptops, and watches for kids. In 2015, they were breached. The hacker downloaded gigs of children's data. Discover what the hacker did once he took the data.
23 min
147
Ep 1: The Phreaky World of PBX Hacking
Farhan Arshad and Noor Aziz Uddin were captured 2 years after being placed on the FBI's Cyber's Most Wanted list for PBX hacking. In this episode, we explain PBX hacking and how hackers are racking up billions of dollars in phone bills. We also learn how the two men were captured.