Full Transcript

A company hires a penetration tester to pose as a new hire, Jeremy from Marketing, to see how much he can hack into in his first week on the job. It doesn’t go as planned.

Guests

Thanks to @TinkerSec for telling us this story.

Thanks

Thanks to the reviewers who previewed this episode before it went live and provided valuable feedback. They include @greyhathackr, Nick, Brett, @r1otctrl, @Pyrostic and a bunch more who wish to remain unidentified.

This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code “DARKNET”.

This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet.

Attribution

Artwork this episode by TrashKiD.

Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.

Additional music by Epidemic Sound.

Equipment

Recording equipment used this episode was the Shure SM7B, a cloudlifter, Audient ID4, Sony MDR7506 headphones, and Hindenburg audio editor.

Embed Episode

Add this episode of Darknet Diaries to your own website with the following embed code:

<iframe frameborder="0" height="200" scrolling="no" src="https://playlist.megaphone.fm?e=ADV6715709308" width="100%"></iframe>

Transcript

[FULL TRANSCRIPT]

JACK: Hey, my name’s Jack, the host of the show. Before making this podcast my job was looking at my clients’ networks to try to find ways to make them more secure. In other words I was on defense locking things down, hardening systems, securing applications, and trying to turn off everything that didn’t need to be on. The defense team is sometimes known as the Blue Team. I’m on the Blue Team. But one day we paid an attacker to come into our office and see how well I did at securing the network. He was a professional penetration tester and I made him sit right next to me. Attackers like this are said to be on the Red Team and this whole Red Team/Blue Team thing is just a term borrowed from the military where they had drills with attackers and defenders.

Read Full Transcript