Jack Recider
๐ค SpeakerAppearances Over Time
Podcast Appearances
From breach exposures to info stealing malware infections, knowing what criminals know about you and your business is the first step to setting things right. Resetting stolen passwords and addressing the enterprise access points that have been stolen by malware helps you protect your business from ransomware, account takeovers, and online fraud.
From breach exposures to info stealing malware infections, knowing what criminals know about you and your business is the first step to setting things right. Resetting stolen passwords and addressing the enterprise access points that have been stolen by malware helps you protect your business from ransomware, account takeovers, and online fraud.
With SpyCloud, you have a trusted partner to fight the good fight with. Their automated solutions, which is built on over 350 billion recaptured assets from the criminal underground, ensure you're not in the dark when it comes to your company's exposure to cybercrime. To get your full Darknet exposure report, visit spycloud.com slash darknetdiaries. That's spycloud.com slash darknetdiaries.
With SpyCloud, you have a trusted partner to fight the good fight with. Their automated solutions, which is built on over 350 billion recaptured assets from the criminal underground, ensure you're not in the dark when it comes to your company's exposure to cybercrime. To get your full Darknet exposure report, visit spycloud.com slash darknetdiaries. That's spycloud.com slash darknetdiaries.
This episode is sponsored by Delete Me. In episode 133, I spoke to Connor Tumbleson about some people from who knows where who were stealing his identity. Luckily, they weren't out to destroy his reputation or extort him, but think of the damage that could be done. We all have data out there, which data brokers use to make profit.
This episode is sponsored by Delete Me. In episode 133, I spoke to Connor Tumbleson about some people from who knows where who were stealing his identity. Luckily, they weren't out to destroy his reputation or extort him, but think of the damage that could be done. We all have data out there, which data brokers use to make profit.
Anyone on the web can buy your private details to do anything they want. This can lead to identity theft, phishing attempts, harassment, and unwanted spam calls. But there's a solution called Delete Me. Take control of your data and keep your private life private by signing up for Delete Me.
Anyone on the web can buy your private details to do anything they want. This can lead to identity theft, phishing attempts, harassment, and unwanted spam calls. But there's a solution called Delete Me. Take control of your data and keep your private life private by signing up for Delete Me.
Now at a special discount for my listeners, you can get 20% off your Delete Me plan when you go to joindeleteme.com slash darknetdiaries and use promo code DD20 at checkout. The only way to get 20% off is to go to joindeleteme.com slash darknetdiaries and enter code DD20 at checkout. That's joindeleteme.com slash darknetdiaries code DD20.
Now at a special discount for my listeners, you can get 20% off your Delete Me plan when you go to joindeleteme.com slash darknetdiaries and use promo code DD20 at checkout. The only way to get 20% off is to go to joindeleteme.com slash darknetdiaries and enter code DD20 at checkout. That's joindeleteme.com slash darknetdiaries code DD20.
Okay, so Deviant is a very well-known physical penetration tester. And we're going to hear three stories about how he's broken into buildings in this episode. And the third one is my favorite, so stick around for that. But I want to first quickly catch up about how he even got to this point.
Okay, so Deviant is a very well-known physical penetration tester. And we're going to hear three stories about how he's broken into buildings in this episode. And the third one is my favorite, so stick around for that. But I want to first quickly catch up about how he even got to this point.
They just didn't have one. So they called up Deviant to come help recover the network. And he went down there, but the network room was locked and nobody could find the key to get in. So they called a locksmith to come try to get the doors open. Now, because Deviant had a little practice picking locks by that time, he took a look at the door.
They just didn't have one. So they called up Deviant to come help recover the network. And he went down there, but the network room was locked and nobody could find the key to get in. So they called a locksmith to come try to get the doors open. Now, because Deviant had a little practice picking locks by that time, he took a look at the door.
This resulted in them calling him back to the office to do a full penetration test. This law firm did not like that those office doors could be opened with just a basic folder. by just shimming it in between the latch and the door. And they wanted to know what else in this building was not secure. And this got Deviant even more into bypassing doors and picking locks and breaking into rooms.
This resulted in them calling him back to the office to do a full penetration test. This law firm did not like that those office doors could be opened with just a basic folder. by just shimming it in between the latch and the door. And they wanted to know what else in this building was not secure. And this got Deviant even more into bypassing doors and picking locks and breaking into rooms.
Deviant was good friends with Dark Tangent, who's the organizer of the hacker conferences Defcon and Black Hat. And Dark Tangent told him, this lockpicking thing is really catching fire.
Deviant was good friends with Dark Tangent, who's the organizer of the hacker conferences Defcon and Black Hat. And Dark Tangent told him, this lockpicking thing is really catching fire.
The first DEFCON I ever went to was DEFCON 17 in 2009 at the Riviera. And that's where I went up into the lockpick village and saw Deviant demonstrate how the inner mechanics of a lock worked. And he put a ray contention bar in my hand and had me practice how to get a lock open. I was fascinated by what he taught me that day. And that's where I bought my first lockpick set.
The first DEFCON I ever went to was DEFCON 17 in 2009 at the Riviera. And that's where I went up into the lockpick village and saw Deviant demonstrate how the inner mechanics of a lock worked. And he put a ray contention bar in my hand and had me practice how to get a lock open. I was fascinated by what he taught me that day. And that's where I bought my first lockpick set.