Rachel discusses (and demonstrates) the art of “vishing” and social engineering. She placed 2nd twice in the Social Engineering Capture the Flag competition at DEFCON 24 and DEFCON 25 and has become a popular speaker and advocate for personal and organizational safety through social engineering awareness.
This episode’s guest is Ray Watson who presented at Black Hat 2017. He joins me to talk about hacker history and share some of his infosec pet peeves. We recorded this interview in July 2017 during the week of Black Hat and DEFCON in Las Vegas. His talk was entitled “Jedi Masters, Sith Lords, and Droids: 5 Generations of Hacking” and can be seen in it’s entirety below.
Ray and Vince hanging out after recording the podcast interview.
My guest this episode is “Jek” a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun to learn about her experiences and pick up a few tips and tricks as I prepare for the Social Engineering Capture The Flag competition at DEFCON next week!
This episode is dedicated to my experience attending the infamous hacker conference known as DEFCON in Las Vegas. DEFCON 24 flew by way too fast, but I managed to interview several attendees.
DEFCON luminary Ryan “1o57” Clarke (pronounced “Lost”) spoke with me about the badge challenge which he helms each year. In the video above 1o57 shows off one of the custom made “Uber Badges” awarded to winners of several contests at DEFCON 24.
My DEFCON 24 badge, which I was convinced was emitting a RF signal. Possibly communicating with our benevolent robot overlords? Alas, no RF detected.
Jake’s DEFCON talk was fun and rapid fire. He delved into his project with partner Lee Johnstone called Arrest Tracker which is a database used to profile cyber crime. Jake had 140 slides and he kept the pace quick. He did give ample props to Threat Butt and other online critics/satirists who represent the disenfranchised and attribution skeptics within the online security industry.