Monitoring and investigating employees' behavior is crucial to maintaining a secure work environment.
Setting up a Raspberry Pi as a file transfer web server can help detect hacking attempts and provide valuable cybersecurity insights.
Thorough security tests and continuous improvement are essential in protecting businesses from theft and unauthorized access.
Deep dives
Unmasking the Network Creeper
A company hires a security consultant to investigate an employee who is making others uncomfortable. The employee is promoted to head of security in an attempt to make him quit. The consultant discovers that the employee has been spying on coworkers, bugging offices, and recording phone calls. After collecting evidence, the consultant helps the company build a case against the employee and turns it over to law enforcement.
The Raspberry Pi Hack
The speaker sets up a Raspberry Pi as a file transfer web server and uses it to detect any hacking attempts. Years later, the speaker discovers that someone has uploaded an exploit and gained access to the Raspberry Pi. Though the hacker couldn't move laterally or access other devices on the network, the speaker learns valuable lessons about cybersecurity.
Taking Down the Inside Threat
A security engineer receives a request to investigate an employee who is making other employees uncomfortable and intruding on their privacy. They discover that the employee has been spying on coworkers, recording phone calls, and even bugging offices. The engineer helps gather evidence and build a case against the employee, leading to his arrest by law enforcement.
Testing the Limits: Breaking into the Network
A security consultant is hired to test the security of a retail company's stores and corporate headquarters. The consultant successfully steals items from the store, gains access to the corporate network, and even removes a cash register. The consultant emphasizes the importance of conducting thorough security tests and helping clients improve their defenses.
The Importance of Going Beyond Compliance
A couple starts their own security company because they were frustrated with the minimal efforts companies made towards security. They focus on simulating real-world attacks and providing meaningful recommendations to clients. They share a story of how they helped a client deal with an employee who was making others uncomfortable and spying on them.
Three stories in one episode. Listen in on one of Dave Kennedy's penetration tests he conducted where he got caught trying to gain entry into a datacenter. Listen to a network security engineer talk about the unexpected visitor found in his network and what he did about it. And listen to Dan Tentler talk about a wild and crazy engagement he did for a client.
Thank you Clay for sharing your story. Check out the WOPR Summit.
Viss also brought an amazing story to share. Thank you too. Learn more about him at Phobos.io.
I first heard Clay's story on the Getting Into Infosec Podcast. Thanks Ayman for finding him and bring that story to my attention.
Sponsors
This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo.
This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn't be. Check them out at https://canary.tools.