We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions
cover of episode 149: Mini-Stories: Vol 3

149: Mini-Stories: Vol 3

2024/9/3
logo of podcast Darknet Diaries

Darknet Diaries

AI Deep Dive AI Chapters Transcript
People
E
Evil Mog
J
Jack Riciter
J
Joe
面临上水汽车贷款,寻求多种解决方案以减轻财务负担。
广
广告
Topics
Jack Riciter: 本集讲述了两个引人入胜的网络安全故事。第一个故事讲述了Evil Mog在阿富汗为加拿大军队维护网络的经历,以及他在面对恶劣环境和火箭袭击等挑战时如何确保士兵能够与家人保持联系。第二个故事讲述了Joe在进行公司渗透测试时遇到的挑战,以及他如何处理由于初级工程师错误操作导致网络瘫痪的事件。这两个故事都突出了网络安全领域中面临的各种挑战,以及专业人员在处理这些挑战时所展现出的技能和责任心。 Evil Mog: 我在阿富汗为加拿大军队维护网络的经历充满挑战,我需要在恶劣的环境下修复受损的设备,并确保士兵能够与家人通话。我处理过火箭袭击、沙尘暴等各种突发事件,也参与过帮助心理受创的士兵与家人联系的行动。这段经历让我深刻体会到网络安全的重要性,以及在危机时刻提供支持的重要性。 Joe: 我是一名渗透测试工程师,我的工作是帮助公司识别和修复安全漏洞。在一次渗透测试中,我发现了一个隐藏摄像头拍摄的不当视频,以及一些严重的系统安全漏洞。我还经历过由于初级工程师错误操作导致网络瘫痪的事件。这些经历让我认识到,沟通能力和风险评估能力在渗透测试中至关重要,而谨慎细致的操作才能避免不必要的损失。

Deep Dive

Chapters
Evil Mog recounts his experience setting up and maintaining communication networks for Canadian forces in Afghanistan. He details the challenges of working in a war zone, including rocket attacks and equipment failures, and shares a heartwarming story of facilitating a video call between a soldier and his wife during childbirth.
  • Evil Mog worked as a network engineer in Afghanistan, supporting communication services for Canadian forces.
  • The harsh environment and frequent rocket attacks posed significant challenges to maintaining network equipment.
  • Evil Mog facilitated a video call between a soldier and his wife in Toronto for the birth of their child.
  • He had to shut down all communications in the theater whenever a casualty occurred to prevent premature notification of families.
  • The experience highlighted the importance of communication and support for soldiers in active war zones.

Shownotes Transcript

In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.SponsorsSupport for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.