Topic
Best Social engineering Podcast Episodes
Social engineering is covered across 4 podcast episodes in our library and 4 expert guests — including Darknet Diaries. Conversations explore core themes like o.mg cable, usb rubber ducky, ant catalog / cottonmouth cable, drawing on firsthand experience and research from leading practitioners.
Below you'll find key insights, core concepts, and actionable advice aggregated from the top episodes — followed by a ranked list of the best social engineering discussions to explore next.
Key Insights on Social engineering
- 1.The O.MG cable, developed by hardware hacker MG, is a malicious USB cable that appears normal but can perform advanced attacks like keystroke injection, mouse control, and USB keylogging, and establish remote Wi-Fi or internet connections.
- 2.MG was inspired to create the O.MG cable after seeing the NSA's "Cottonmouth" cable in the leaked ANT catalog, aiming to democratize and improve upon its capabilities at a fraction of the cost.
- 3.The O.MG cable supports autonomous actions like geofencing and can store hundreds of individual or giant payloads, executing them at speeds up to a thousand keystrokes per second.
- 4.Red teams have successfully deployed O.MG cables to gain and maintain long-term persistence in highly secured environments, including DoD networks, often remaining undetected even after active security sweeps.
- 5.The O.MG cable demonstrated its ability to compromise air-gapped systems, such as a digital forensics evidence computer, by creating a stealthy bidirectional data link that bypasses network isolation.
- 6.Hak5, the seller of O.MG cables, voluntarily implements strict export controls, only selling to explicitly allowed, friendly NATO and Five Eyes countries, despite potential profit from a broader market.
Key Concepts in Social engineering
O.mg cable
A malicious USB cable created by MG that looks and functions like a standard cable but contains an embedded microcontroller capable of keystroke injection, mouse control, USB keylogging, and remote Wi-Fi/internet connectivity for dynamic attacks. It is presented as a highly stealthy and effective tool for penetration testing and red-teaming.
Usb rubber ducky
A device that looks like a USB thumb drive but, when plugged into a computer, emulates a keyboard and rapidly types pre-programmed keystrokes to execute scripts or infect the system. MG's early work on miniaturizing its functionality for his 'Mr. Self Destruct' project directly influenced the O.MG cable's development.
Ant catalog / cottonmouth cable
Leaked NSA documents from 2008 detailing various espionage tools, including the 'Cottonmouth,' a malicious USB cable capable of wirelessly installing malware. This catalog served as a significant inspiration for MG to create a more accessible and advanced version of such hardware, recognizing the power shift such technology could enable.
Red-teaming
A practice in cybersecurity where a team simulates adversarial attacks against an organization's systems, networks, and physical security to test their defenses. The O.MG cable is frequently discussed as a valuable tool for red-teamers to achieve persistence and exfiltration in challenging environments.
Actionable Takeaways
- ✓Assume any untrusted or unknown USB cable is a potential threat and avoid plugging it into sensitive devices or networks.
- ✓Implement stringent physical security measures around exposed computer ports in critical environments, such as server rooms, data centers, and public-facing terminals.
- ✓Educate employees and staff about the dangers of 'found' USB devices and the importance of exclusively using verified, organization-approved cables.
- ✓Conduct thorough physical security sweeps, looking for anomalous or new cables, especially in response to detected breaches or during routine audits.
- ✓Review and reinforce policies regarding the use of external hard drives and other peripheral devices, particularly in air-gapped or highly sensitive systems.
Top Episodes — Ranked by Insight (4)
Darknet Diaries
You'll Never Trust Another USB Cable After Hearing This 🐍 Darknet Diaries | Ep. 161: MG
The O.MG cable, developed by hardware hacker MG, is a malicious USB cable that appears normal but can perform advanced attacks like keystroke injection, mouse control, and USB keylogging, and establish remote Wi-Fi or internet connections.
Darknet Diaries
Secrets of Defcon: Untold Stories From the World's Greatest Hacker Conference 💾 Ep.157: Grifter
Grifter's early exposure to pirated games and subsequent need to troubleshoot self-induced malware problems fostered crucial foundational skills in understanding computers and networks [10:34].
Darknet Diaries
They Hired Me to Steal a Shopping Cart Full of Human DNA 🧬 Darknet Diaries Ep. 160: Greg
Greg Linares was arrested at 14 for creating a macro virus in Excel that changed his grades and attendance in high school, making him the youngest person in Arizona arrested for a computer crime [13:42, 16:54].
Darknet Diaries
There's No Way Into This Tech Company's Server Room ... Except Through the Sewer💧Episode 166: Maxie
Physical penetration testing often leverages open-source intelligence (OSINT) to identify potential entry points or pretexts, such as knowledge of a company's international connections or maintenance schedules (08:35, 45:59).
Episodes ranked by insight density — scored on key takeaways, concepts explained, and actionable advice. AI-generated summaries; listen to full episodes for complete context.









