My guest this episode is “Jek” a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun to learn about her experiences and pick up a few tips and tricks as I prepare for the Social Engineering Capture The Flag competition at DEFCON next week!
At this year’s RSA security conference in San Francisco, researcher Rob Graham gave a presentation entitled “Mirai and IoT Botnet Analysis.” His talk examined the infamous “Mirai” Internet of Things botnet and shared details on how it operates. Graham also covered technical aspects of the cameras it infects and detailed his own experimentation with Mirai in the wild. He went on to discuss last year’s massive DDoS attacks on DNS provider Dyn, which involved variations of the Mirai IoT botnet.
No official AV video recording of this talk, but the audio and RSAC slides are all you need.
This episode breaks down last week’s online Q & A between Twitter CEO Jack Dorsey and infamous NSA whistle blower Edward Snowden on Periscope. The event, promoted by the organizers of the campaign Pardon Snowden, featured a lengthy discussion on privacy and the role of social media in sharing user data with law enforcement and intelligence agencies.
Jacob Young – who submitted a question to Snowden and had it answered, sorta.
The event also included questions from Twitter users. Jacob Young, a software engineer and privacy advocate, was one of the lucky users who submitted a question and had it answered by Snowden during the event. Jacob joins the podcast to give his reaction to Snowden’s answer to his question and also shares his thoughts on mass surveillance, privacy and more.
If you are curious about the Snowden Q&A in question and want to view the event in it’s entirety, here’s a link to the Periscope video: https://www.periscope.tv/w/1vOxwgnXeYLxB
As the glory of 2016 rolls to an end, I plan to empty my archive of some unreleased recordings which never made it on to any podcasts over the past year.
Rob Graham
I’m starting with this recording from the RSA Conference earlier this year in San Francisco, CA. It features Jen Ellis of Rapid7 moderating a “Security Thunderdome” debate between Rob Graham (Errata Security) and Josh Corman (Atlantic Council). It’s basically a debate about debating. A very spirited breakdown of the anatomy of a debate with a focus on cyber security.
The audio quality isn’t the best, but good enough to follow along. If you listen closely you’ll hear me ask a question from the audience toward the end. Big thanks to RSA, Jen, Rob, and Josh for allowing me to record the session. I hope this “Thunderdome Debate” format will return next year to RSA and possibly expand to at least another hour. Enjoy!
This episode is dedicated to my experience attending the infamous hacker conference known as DEFCON in Las Vegas. DEFCON 24 flew by way too fast, but I managed to interview several attendees.
DEFCON luminary Ryan “1o57” Clarke (pronounced “Lost”) spoke with me about the badge challenge which he helms each year. In the video above 1o57 shows off one of the custom made “Uber Badges” awarded to winners of several contests at DEFCON 24.
My DEFCON 24 badge, which I was convinced was emitting a RF signal. Possibly communicating with our benevolent robot overlords? Alas, no RF detected.
Jon aka “@wvualphasoldier” is a security researcher, consultant, policy advisor and former US military PSYOP soldier. He served on and off the battlefield in Iraq and Afghanistan. We discuss the recent Shadow Brokers auctioning of computer network exploits which are alleged to have been stolen from NSA linked security firm, Equation Group.
TOPICS INCLUDE: Shadow Brokers, Equation Group, NSA, PSYOP, atmospherics, military intelligence, deception operations, propaganda, patriot hackers, The Jester, ISIS, Junaid Hussain (aka TriCk), Edward Snowden, Zipa Dux, insider threat vs. outside attacker theories, attribution, @thegrugq, Takashi Shimura, Rashomon and more!
He joins Vince to discuss attribution in the wake of the DNC email leaks which are being attributed to cyber espionage by Russian intelligence agencies. Jeff recently wrote a medium post in response to attribution of the DNC hacks to the Russian government.
TOPICS INCLUDE:
Coastguard radioman :: stylistic analysis :: Shlomo Argamon :: Attribution :: Sony Pictures hack :: North Korea :: Russian hackers :: language analysis :: DNC leak/hack :: Thomas Rid :: Crowdstrike :: Fire Eye :: APTs :: cyber espionage :: Ukraine :: Swift on Security
Mano ‘dash4rk’ Paul is a security researcher and author. He is co-founder of Hackformers, a non-profit Christian hacker collective based in Austin, TX. His son Reuben ‘RAPst4r’ Paul attends the Harmony School of Science, in Austin. Reuben was once voted America’s most beautiful baby and he is also the youngest person to achieve a black belt in Shaolin-Do Kung Fu, at the age of 7 years old. Reuben is also the CEO of Prudent Games and co-founder, with his dad, of the non-profit educational platform Cyber Shaolin. Cyber Shaolin aims to promote and improve the awareness and education of cyber security and technology to kids and adults.
Below is a “Hashing” video by Reuben Paul, one of several educational videos offered for free on the Cyber Shaolin “Lessons” page.
NOTE: This interview was conducted prior to Reuben’s speaking appearance at the GroundZero Summit in India. Here is a recording of the talk he references on the podcast:
Four years ago HECTOR XAVIER MONSEGUR, an Anonymous computer hacker better know by the online pseudonym “Sabu”, pleaded guilty in a U.S. District Court to 12-counts of computer hacking and other crimes. A conviction that was kept secret from the public.
At the time, many activists, supporters and participants involved with Anonymous were unaware that months prior Mr. Monsegur had agreed to cooperate with the FBI who were investigating the criminal activity of hackers operating within the Anonymous collective.
Mr. Monsegur became public enemy number one by Anonymous once it was revealed he had cooperated with law enforcement as they located and arrested Anonymous hackers. Most notably, the arrest of a hacker known online as “Anarchaos” and later unmasked as Mr. Jeremy Hammond.