3 Shells

Three stories in one episode. Listen in on one of Dave Kennedy’s penetration tests he conducted where he got caught trying to gain entry into a datacenter. Listen to a network security engineer talk about the unexpected visitor found in his network and what he did about it. And listen to Dan Tentler talk about a wild and crazy engagement he did for a client.

Guests

A very special thanks to Dave Kennedy. Learn more about his company at trustedsec.com.

Thank you Clay for sharing your story. Check out the WOPR Summit.

Viss also brought an amazing story to share. Thank you too. Learn more about him at Phobos.io.

I first heard Clay’s story on the Getting Into Infosec Podcast. Thanks Ayman for finding him and bring that story to my attention.

Sponsors

This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.

This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

Thanks

Thanks to the reviewers who previewed this episode before it went live and provided valuable feedback. They include @greyhathackr, Nick, Brett, @r1otctrl, @Pyrostic, Karla, and a few more who wish to remain unidentified.

Attribution

Artwork this episode by Yakoross.

Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.

Additional music by Epidemic Sound.

Equipment

Recording equipment used this episode was the Shure SM7B, a cloudlifter, Audient ID4, Sony MDR7506 headphones, and Hindenburg audio editor.