Full Transcript

Three stories in one episode. Listen in on one of Dave Kennedy’s penetration tests he conducted where he got caught trying to gain entry into a datacenter. Listen to a network security engineer talk about the unexpected visitor found in his network and what he did about it. And listen to Dan Tentler talk about a wild and crazy engagement he did for a client.

Guests

A very special thanks to Dave Kennedy. Learn more about his company at trustedsec.com.

Thank you Clay for sharing your story. Check out the WOPR Summit.

Viss also brought an amazing story to share. Thank you too. Learn more about him at Phobos.io.

I first heard Clay’s story on the Getting Into Infosec Podcast. Thanks Ayman for finding him and bring that story to my attention.

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Thanks

Thanks to the reviewers who previewed this episode before it went live and provided valuable feedback. They include @greyhathackr, Nick, Brett, @r1otctrl, @Pyrostic, Karla, and a few more who wish to remain unidentified.

Attribution

Artwork this episode by Yakoross.

Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.

Additional music by Epidemic Sound.

Equipment

Recording equipment used this episode was the Shure SM7B, a cloudlifter, Audient ID4, Sony MDR7506 headphones, and Hindenburg audio editor.

Embed Episode

Add this episode of Darknet Diaries to your own website with the following embed code:

<iframe frameborder="0" height="200" scrolling="no" src="https://playlist.megaphone.fm?e=ADV2845437271" width="100%"></iframe>

Transcript

[FULL TRANSCRIPT]

JACK: Hey, it’s Jack, host of the show. A long time ago I set up a file-sharing website at home on a Raspberry Pi. I set it up to make it easy to transfer files between me and anyone I needed to send files to. It was a simple website; drag and drop the file onto the webpage and boom, it’s hosted on my website for like, a week, and then it gets deleted. I knew it wasn’t secure so I never posted anything that was sensitive to it but I also took this opportunity to see if I could detect anyone trying to hack into the thing. I set up all my best sensors I had at home; a firewall, an intrusion detection system, full packet captures using Security Onion, I turned on tons of logging and watched but nothing happened. Nobody knew my site existed to even think about trying to exploit it. Oh, well.

Read Full Transcript