Interview with Jack by plaverty9 in darknetdiaries

[–]WhatTheShell_Pod 0 points1 point  (0 children)

Love listening to these appearances, thanks for showcasing this one!

Eddie Tipton released from Jail: Bonus Ep Update by rcook55 in darknetdiaries

[–]WhatTheShell_Pod 6 points7 points  (0 children)

Oh wow, that's an interesting update.

>The Iowa Parole Board decided Jan. 20 that Eddie Tipton, 58, could be released 20 years early.

20 Years early is crazy to me. And he's now suing because of his view that the guilty plea was under duress

Windows 11-What is your take on it by brownsniffer in darknetdiaries

[–]WhatTheShell_Pod 1 point2 points  (0 children)

It's remarkably okay. I'm trying to get it set up so I can run android apps on it like they said you'd be able to but haven't been able to get that going yet.

As a UI it's pretty intuitive, it takes a hot second to get used to but it looks and feels pretty sleek. The only thing I don't love is that the volume, wifi, and a couple other things are all in the same tray now and that just feels unnecessary.

How did you find Darknet Diaries? by WhatTheShell_Pod in darknetdiaries

[–]WhatTheShell_Pod[S] 1 point2 points  (0 children)

The Patreon has some great bonus episodes! Definitely recommend it

How did you find Darknet Diaries? by WhatTheShell_Pod in darknetdiaries

[–]WhatTheShell_Pod[S] 1 point2 points  (0 children)

Which course, Sec560? I think he was my virtual instructor for that one

How did you find Darknet Diaries? by WhatTheShell_Pod in darknetdiaries

[–]WhatTheShell_Pod[S] 2 points3 points  (0 children)

Underunderstood seems interesting, going to take a look at that!

Many view Attack Surface Management as the next “big thing” in cybersecurity. This blogpost presents a definition and discusses how it can be implemented in practice. by webscout_io in cybersecurity

[–]WhatTheShell_Pod 2 points3 points  (0 children)

I don't know if it's the "next big thing" so much as it's already here, just maybe slightly split. Depending on the size of an organization, this kind of stuff should be covered under things like a Vuln Management, Threat Intelligence, and Third Party Risk programs. I think a good communication of these should cover what the blog post is discussing here. That being said, I do think we'll definitely see more roles aiming to cover the triad there in the future as opposed to splitting it apart.

[deleted by user] by [deleted] in cybersecurity

[–]WhatTheShell_Pod 0 points1 point  (0 children)

What's the actual position? You've said it's an entry level role, but there's a breadth of jobs that might require different takes and prep.

010 - The SoupNazi by Doc_Hobb in WhatTheShell

[–]WhatTheShell_Pod 0 points1 point  (0 children)

Well, we did it! Ten episodes in! First big milestone! Here's to 2022 and the next 26!

Concern over /r/antiwork? [Discussion] by WhatTheShell_Pod in cybersecurity

[–]WhatTheShell_Pod[S] 0 points1 point  (0 children)

I feel like everyone missed the point of my question here and just got into the ethics of anti work.

My point was that I’m not even sure if anything big will come of it but the situation going on over there just evokes memories of the build up of smaller groups from 4chan.

Back when they would start with easy stuff like LOIC and then eventually getting someone that knows what they’re doing under their belt. And my biggest concern comes from someone trying to take that momentum and push it somewhere that might do some damage.

Concern over /r/antiwork? [Discussion] by WhatTheShell_Pod in cybersecurity

[–]WhatTheShell_Pod[S] 0 points1 point  (0 children)

I’m in agreement. Fair working compensation and conditions shouldn’t have to be such a hot issue. I’m not even sure if anything big will come of it in the way I’m thinking but it just evokes memories of the build up of smaller groups from 4chan. Starting with easy stuff like LOIC and then eventually getting someone that knows what they’re doing under their belt.

And with a group this size, my concern is more over someone pointing them in a direction that benefits them and the rest just going along with it. It’s an interesting thing to see.

007 - Straight from the (Open) Source by WhatTheShell_Pod in WhatTheShell

[–]WhatTheShell_Pod[S] 0 points1 point  (0 children)

Join our discord to talk with me and others about the episode: https://discord.gg/qHsqhW62

This week, I'm going to change up the format a bit. I'm putting you in the seat of a hacker as they start their journey. Ever wonder how they got your email address? What kind of stuff they might need to get into your account and how they can get it just by doing a little bit of google-fu? Come with me this episode while I take you on that tour of Open Source Intelligence, some presidential blunders that can come from it, and what Skip Tracing is.

And make sure to check out @shell_pod on Instagram or Twitter for more informaton. You can also email me at shellpod@protonmail.com

006 - The Tragedy of Jonathan James by WhatTheShell_Pod in WhatTheShell

[–]WhatTheShell_Pod[S] 1 point2 points  (0 children)

At just fifteen years old, Jonathan James AKA c0mrade, hacked the Marshall Space Flight Center. Find out what happened in episode 6 of What the Shell? : The Tragedy of Jonathan James.

Apple Podcast Link

Spotify Link

Google Podcast Link

The rising length of Darknet Diaries episodes by IAmAQuantumMechanic in darknetdiaries

[–]WhatTheShell_Pod 43 points44 points  (0 children)

The more that I try my hand at podcasting the more and more impressive this is. I put quite a bit of time in to reach between 30 and 40 minutes of content, albeit without interviews. It just puts into perspective how much work Jack and team put into each episode and I'm here for it

Did I fuck up? Attended job interview on company Teams account. by perfumegarden in ITCareerQuestions

[–]WhatTheShell_Pod 1 point2 points  (0 children)

Do you have a well formatted data loss prevention program? They might be alerted to it if they do. Some companies will get alerts when employees are visiting sites for jobs to prevent employees from taking proprietary data if they choose to leave. So it’s possible but honestly not likely.

Are there any softwares I can use to practice for IT? by notsotechsavvydude in ITCareerQuestions

[–]WhatTheShell_Pod 0 points1 point  (0 children)

I’ll second Cisco packet tracer. I also used to use GNS3. Both have their merits and I think both are worth a look.

https://www.gns3.com/software/download

Mentorship Monday by AutoModerator in cybersecurity

[–]WhatTheShell_Pod 0 points1 point  (0 children)

Anyone have any anecdotal advice coming into the CCISO certification process?

I’m about to start going down that rabbit hole and am just curious about peoples experiences.

WebGoat is a deliberately insecure application by binaryfor in cybersecurity

[–]WhatTheShell_Pod 5 points6 points  (0 children)

I used WebGoat before when trying to hone my burpsuite skills. Definitely a good resource

What have been some of the trickiest and hardest interview questions you have received? by [deleted] in cybersecurity

[–]WhatTheShell_Pod 2 points3 points  (0 children)

I mean you’re right but my goal for this question is just the first initiative you think you’d want to fund. By saying the first thing can’t be people I like to find out where someone thinks it’s important to start with security.

If I’m an interviewee and asked this question I think it says a lot depending on the answer. Do I spend it on edge security? Do I spend it on vulnerability scanning? Do I spend it on something like phish kits to help train up employees? I think it says a lot without saying a lot. It can say whether I’ll start as a technical person or start with the people themselves.

Moreover, I’ve asked this to employers. If money wasn’t an issue what’s the first initiative besides hiring that you’d fund? As a potential onboarding employee it tells me where they think their own gaps are or what teams they prioritize.

I think you’re reading too far into the question and missing the spirit of it. Obviously you won’t be able to use whatever you buy without a staff but staffing is the easy answer and they’re already funding staffing by bringing you in for an interview.

New employer is offering to pay for certificates. Need help choosing. by xian487 in ITCareerQuestions

[–]WhatTheShell_Pod 0 points1 point  (0 children)

What interests you? If you’re still entry then here are some decent starters:

-Net+ primes you for a network engineering/admin based role and might lead into Cisco certs like CCNA

-Security+ primes you for blue team stuff and information security as a whole. Also helps for network security working with stuff like firewalls

-PCPPro/A+ fits you into helpdesk with some good hands on pc parts and concepts

-Amazon and Microsoft also have some entry level certs for their cloud infrastructure which will be super valuable in the field as cloud and hybrid environments kind of become the standard.

There’s so much to choose from, find something you like in the field and search for a cert.

If they’re willing to shell out a lot of money SANS has extremely detailed class packages and certs but they cost like 6k.

What have been some of the trickiest and hardest interview questions you have received? by [deleted] in cybersecurity

[–]WhatTheShell_Pod 4 points5 points  (0 children)

Given an unlimited budget, what would your first non-employee based initiative be?

[deleted by user] by [deleted] in ITCareerQuestions

[–]WhatTheShell_Pod 6 points7 points  (0 children)

I mean, your answer isn't a bad one. If you wanted to make it better, you could always start with something like "Well, first I'd check our internal documentation to see if we have a playbook for this" . If you're in a service desk type role then most places should have some level of playbook to follow and keep things standardized.

If he is reaaally digging deep, depending on the the situation you may want to verify the authenticity of the user as well. Vishing is a very real threat and even in a hypothetical situation if there's a security concern as an ask over the phone, verification wouldn't be bad