Jack Recider
👤 PersonAppearances Over Time
Podcast Appearances
And he won't tell me any of the other ways that he gets into these computers because he says if he tells us, then the scammers are going to hear this and fix it and he'll lose access. So he keeps his little hacking method secret. But my mind cannot help but start to brainstorm ideas on how you could hack into a scammer's computer. So let me just think out loud here for a minute.
And he won't tell me any of the other ways that he gets into these computers because he says if he tells us, then the scammers are going to hear this and fix it and he'll lose access. So he keeps his little hacking method secret. But my mind cannot help but start to brainstorm ideas on how you could hack into a scammer's computer. So let me just think out loud here for a minute.
Okay, so when you connect, like when the scammer connects into Jim's computer to do that remote support, right, that scammer is going to be coming from a specific IP, and Jim could probably see that, right? If he does Wireshark or something, he can capture that IP, and then he's got their public IP. And from there...
Okay, so when you connect, like when the scammer connects into Jim's computer to do that remote support, right, that scammer is going to be coming from a specific IP, and Jim could probably see that, right? If he does Wireshark or something, he can capture that IP, and then he's got their public IP. And from there...
Could he then like port scan that IP and look for open ports and then try to find like some exploits or vulnerabilities to hit those ports? Maybe. Maybe that is possible. Another thing is if they're using like some remote desktop software, is there a bug in that software that Jim can exploit to reverse the connection? Yeah.
Could he then like port scan that IP and look for open ports and then try to find like some exploits or vulnerabilities to hit those ports? Maybe. Maybe that is possible. Another thing is if they're using like some remote desktop software, is there a bug in that software that Jim can exploit to reverse the connection? Yeah.
I don't know how he does it, but even if I hit the nail on the head, Jim's not going to admit to how he hacks into their computers.
I don't know how he does it, but even if I hit the nail on the head, Jim's not going to admit to how he hacks into their computers.
We're going to take a quick commercial break. But when we come back, I'm going to play you some of my favorite clips from his channel. And you're not going to want to miss this. Support for this show comes from Black Hills Information Security. This is a company that does penetration testing, incident response, and active monitoring to help keep businesses secure.
We're going to take a quick commercial break. But when we come back, I'm going to play you some of my favorite clips from his channel. And you're not going to want to miss this. Support for this show comes from Black Hills Information Security. This is a company that does penetration testing, incident response, and active monitoring to help keep businesses secure.
I know a few people who work over there and I can vouch they do very good work. If you want to improve the security of your organization, give them a call. I'm sure they can help. But the founder of the company, John Strand, is a teacher, and he's made it a mission to make Black Hills Information Security world-class in security training.
I know a few people who work over there and I can vouch they do very good work. If you want to improve the security of your organization, give them a call. I'm sure they can help. But the founder of the company, John Strand, is a teacher, and he's made it a mission to make Black Hills Information Security world-class in security training.
You can learn things like penetration testing, securing the cloud, breaching the cloud, digital forensics, and so much more. But get this, the whole thing is pay what you can. Black Hills believes that great intro security classes do not need to be expensive, and they are trying to break down barriers to get more people into the security field.
You can learn things like penetration testing, securing the cloud, breaching the cloud, digital forensics, and so much more. But get this, the whole thing is pay what you can. Black Hills believes that great intro security classes do not need to be expensive, and they are trying to break down barriers to get more people into the security field.
And if you decide to pay over $195, you get six months access to the MetaCTF Cyber Range, which is great for practicing your skills and showing them off to potential employers. Head on over to blackhillsinfosec.com to learn more about what services they offer and find links to their webcasts to get some world-class training. That's BlackHillsInfosec.com. BlackHillsInfosec.com.
And if you decide to pay over $195, you get six months access to the MetaCTF Cyber Range, which is great for practicing your skills and showing them off to potential employers. Head on over to blackhillsinfosec.com to learn more about what services they offer and find links to their webcasts to get some world-class training. That's BlackHillsInfosec.com. BlackHillsInfosec.com.
Jim is known for hacking into scammers' computers and exposing them. It's really quite wild to watch. He has over 100 videos on YouTube now, and many of them are exactly this. It's amazing just to hear the scammers' reaction when he tells them some detail about them that he shouldn't know.
Jim is known for hacking into scammers' computers and exposing them. It's really quite wild to watch. He has over 100 videos on YouTube now, and many of them are exactly this. It's amazing just to hear the scammers' reaction when he tells them some detail about them that he shouldn't know.
For instance, there's one where he hacked into someone's computer in the call center and got a list of everyone's names and their fake names. And this is one of my favorite videos. Let me just play a clip for you from it. Hello?
For instance, there's one where he hacked into someone's computer in the call center and got a list of everyone's names and their fake names. And this is one of my favorite videos. Let me just play a clip for you from it. Hello?