🎙️
AIPodify

Ranked List

Best Podcast Episodes About Penetration testing

We've compiled 3 podcast episodes about penetration testing from Darknet Diaries and distilled each into AI-generated summaries, key takeaways, and actionable insights. Guests like Greg Linares have covered this topic in depth. Each episode is scored by depth of insight — the most information-dense conversations are ranked first so you can skip straight to the best.

3 Episodes Ranked by Insight Depth

#1

Darknet Diaries

They Hired Me to Steal a Shopping Cart Full of Human DNA 🧬 Darknet Diaries Ep. 160: Greg

  • Greg Linares was arrested at 14 for creating a macro virus in Excel that changed his grades and attendance in high school, making him the youngest person in Arizona arrested for a computer crime [13:42, 16:54].
  • While at cybersecurity company eEye, Linares initially found a 'zero-day' in Microsoft Office 2007 that only triggered with a debugger attached, nearly costing him his job due to company embarrassment after a press release [39:53, 40:58].
Read →
#2

Darknet Diaries

"The Building Has Malware." Adventures in Appsec 🕷 Darknet Diaries Ep. 165: Tanya

  • SQL injection is a powerful attack vector that can bypass login screens and exfiltrate sensitive data, as Tanya Janca demonstrated in a Capture the Flag (CTF) challenge and experienced firsthand with her own applications.
  • Blind SQL Injection is a sophisticated technique where attackers exfiltrate data by asking a database yes/no questions, often on specific criteria like the first letter of a field, rather than directly retrieving records.
Read →
#3

Darknet Diaries

There's No Way Into This Tech Company's Server Room ... Except Through the Sewer💧Episode 166: Maxie

  • Physical penetration testing often leverages open-source intelligence (OSINT) to identify potential entry points or pretexts, such as knowledge of a company's international connections or maintenance schedules (08:35, 45:59).
  • Social engineering frequently exploits human tendencies, with Maxi Reynolds successfully using pretexts like a Swedish ambassador or a maintenance worker to bypass initial security checks (10:11, 45:59).
Read →