EvilMog, a glider pilot and former military cadet, shares gripping stories from troubleshooting networks in Afghanistan, including a heartwarming moment connecting a soldier with his newborn. Joe Sarkisian, a penetration tester, recounts valuable lessons learned during ethical hacking engagements, discussing challenges that arise in network assessments. Both guests illustrate the emotional and technical complexities of their work, highlighting the crucial role of communication and storytelling in high-stakes environments.
48:04
forum Ask episode
web_stories AI Snips
view_agenda Chapters
auto_awesome Transcript
info_circle Episode notes
question_answer ANECDOTE
War Zone Tech Support
EvilMog, after leaving the military, worked in Afghanistan supporting communication for soldiers.
He set up and repaired networks, often under dangerous conditions like rocket attacks and sandstorms.
question_answer ANECDOTE
A Birth in a War Zone
After a soldier's convoy was hit by an IED, EvilMog facilitated a video call between the soldier and his wife giving birth.
This act provided critical support to the soldier during a traumatic time, possibly saving his life.
question_answer ANECDOTE
Responder's Power
Joe, a penetration tester, usually starts his assessments with Responder to quickly gather credentials.
This tool exploits Windows' attempts to connect to shared drives, capturing hashes that can be cracked to reveal passwords.
Get the Snipd Podcast app to discover more snips from this episode
In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.
Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.
Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.
Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.