πŸŽ™οΈ
AIPodify

Ranked List

Best Podcast Episodes About Red teaming

We've compiled 3 podcast episodes about red teaming from Darknet Diaries and distilled each into AI-generated summaries, key takeaways, and actionable insights. Guests like MG have covered this topic in depth. Each episode is scored by depth of insight β€” the most information-dense conversations are ranked first so you can skip straight to the best.

3 Episodes Ranked by Insight Depth

#1

Darknet Diaries

You'll Never Trust Another USB Cable After Hearing This 🐍 Darknet Diaries | Ep. 161: MG

  • β†’The O.MG cable, developed by hardware hacker MG, is a malicious USB cable that appears normal but can perform advanced attacks like keystroke injection, mouse control, and USB keylogging, and establish remote Wi-Fi or internet connections.
  • β†’MG was inspired to create the O.MG cable after seeing the NSA's "Cottonmouth" cable in the leaked ANT catalog, aiming to democratize and improve upon its capabilities at a fraction of the cost.
Read β†’
#2

Darknet Diaries

They Hired Me to Steal a Shopping Cart Full of Human DNA 🧬 Darknet Diaries Ep. 160: Greg

  • β†’Greg Linares was arrested at 14 for creating a macro virus in Excel that changed his grades and attendance in high school, making him the youngest person in Arizona arrested for a computer crime [13:42, 16:54].
  • β†’While at cybersecurity company eEye, Linares initially found a 'zero-day' in Microsoft Office 2007 that only triggered with a debugger attached, nearly costing him his job due to company embarrassment after a press release [39:53, 40:58].
Read β†’
#3

Darknet Diaries

There's No Way Into This Tech Company's Server Room ... Except Through the SewerπŸ’§Episode 166: Maxie

  • β†’Physical penetration testing often leverages open-source intelligence (OSINT) to identify potential entry points or pretexts, such as knowledge of a company's international connections or maintenance schedules (08:35, 45:59).
  • β†’Social engineering frequently exploits human tendencies, with Maxi Reynolds successfully using pretexts like a Swedish ambassador or a maintenance worker to bypass initial security checks (10:11, 45:59).
Read β†’