Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing

Jack Recider

👤 Person
3924 total appearances

Appearances Over Time

Podcast Appearances

Darknet Diaries
144: Rachel

Cut your wireless bill to $15 a month at mintmobile.com slash darknet. $45 upfront payment required, equivalent to $15 a month. New customers on first three-month plan only. Speed slower above 40 gigabytes on unlimited plan. Additional taxes, fees, and restrictions apply. See Mint Mobile for details. Gather around. In this episode, we're going to hear stories from Rachel Toback.

Darknet Diaries
144: Rachel

Cut your wireless bill to $15 a month at mintmobile.com slash darknet. $45 upfront payment required, equivalent to $15 a month. New customers on first three-month plan only. Speed slower above 40 gigabytes on unlimited plan. Additional taxes, fees, and restrictions apply. See Mint Mobile for details. Gather around. In this episode, we're going to hear stories from Rachel Toback.

Darknet Diaries
144: Rachel

And she's one of the best social engineers I've ever met. Let's start with your origin story. As a kid, how did you get interested in this type of work?

Darknet Diaries
144: Rachel

And she's one of the best social engineers I've ever met. Let's start with your origin story. As a kid, how did you get interested in this type of work?

Darknet Diaries
144: Rachel

Did you get into computers when you were older or still in middle school, I suppose?

Darknet Diaries
144: Rachel

Did you get into computers when you were older or still in middle school, I suppose?

Darknet Diaries
144: Rachel

Okay, so DEF CON is the annual hacker conference in Las Vegas. It's wild there. You'll see people walking around with antennas sticking out of their backpacks, talks about how to bypass just about anything on a computer, and tons of villages that focus on specific areas of hacking. The Social Engineering Village is one of the more popular ones.

Darknet Diaries
144: Rachel

Okay, so DEF CON is the annual hacker conference in Las Vegas. It's wild there. You'll see people walking around with antennas sticking out of their backpacks, talks about how to bypass just about anything on a computer, and tons of villages that focus on specific areas of hacking. The Social Engineering Village is one of the more popular ones.

Darknet Diaries
144: Rachel

And when Rachel's husband went into this village and saw what they were doing, he immediately called her up to tell her what he was seeing.

Darknet Diaries
144: Rachel

And when Rachel's husband went into this village and saw what they were doing, he immediately called her up to tell her what he was seeing.

Darknet Diaries
144: Rachel

And she's still like, no, I'll pass. Thanks.

Darknet Diaries
144: Rachel

And she's still like, no, I'll pass. Thanks.

Darknet Diaries
144: Rachel

What she's watching was the social engineering contest. There's 14 contestants and they're given the task to basically get enough information to hack into a company all through phone calls. So you have to prepare and figure out who would be an easy target to get information from and what's their phone number.

Darknet Diaries
144: Rachel

What she's watching was the social engineering contest. There's 14 contestants and they're given the task to basically get enough information to hack into a company all through phone calls. So you have to prepare and figure out who would be an easy target to get information from and what's their phone number.

Darknet Diaries
144: Rachel

And you better have backup numbers in case the person you call doesn't answer or hangs up on you. Once you do get someone on the phone, you get points for every bit of security data you can get off them. So if you can get them to tell you what operating system they use, you get a point or a flag.

Darknet Diaries
144: Rachel

And you better have backup numbers in case the person you call doesn't answer or hangs up on you. Once you do get someone on the phone, you get points for every bit of security data you can get off them. So if you can get them to tell you what operating system they use, you get a point or a flag.

Darknet Diaries
144: Rachel

And maybe from there, you try to figure out what browser they use, information about their security guards, what janitor service they use. You can't just ask these questions directly. It raises suspicion. So you've got to provide a pretext or pretend to be someone else.

Darknet Diaries
144: Rachel

And maybe from there, you try to figure out what browser they use, information about their security guards, what janitor service they use. You can't just ask these questions directly. It raises suspicion. So you've got to provide a pretext or pretend to be someone else.