podcast cover
Tech

Darknet Diaries

Jack Rhysider

+24 FANS
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnera...Show More
Best
Newest
Ep 18: Jackpot

23:05 | Jul 1st, 2018

A man addicted to gambling finds a bug in a video poker machine that lets him win excessive amounts of money.Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 10: Misadventures of a Nation State Actor

35:25 | Jan 1st, 2018

In today's world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exactly how it's done.Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 45: XBox Underground (Part 1)

1:22:19 | Aug 20th

This is the story about the XBox hacking scene and how a group of guys pushed the hacking a little too far.This is part 1 of a 2 part series.SponsorsThis episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code "DARKNET...Show More
Ep 44: Zain

36:46 | Aug 6th

Ransomware is ugly. It infects your machine and locks all the the data and to unlock you have to pay a fee. In this episode we dive into some of the people behind it.SponsorsThis episode was sponsored by CMD. Securing Linux systems is hard, let CMD h...Show More
Ep 43: PPP

1:02:51 | Jul 23rd

This is the story about how I acquired a black badge from DEFCON (pictured above).We also hear the story about who PPP is, and their CTF journey at DEFCON.This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code “D...Show More
Ep 42: Mini-Stories: Vol 2

56:15 | Jul 9th

Three stories in one episode. Listen in on one of Dave Kennedy's penetration tests he conducted where he got caught trying to gain entry into a datacenter. Listen to a network security engineer talk about the unexpected visitor found in his network a...Show More
Ep 41: Just Visiting

51:16 | Jun 25th

Join JekHyde and Carl on a physical penetration test, a social engineering engagagement, a red team assessment. Their mission is to get into a building they shouldn't be allowed, then plant a rogue computer they can use to hack into the network from ...Show More
Ep 40: No Parking

1:02:28 | Jun 11th

Take a ride with a red teamer. A physical penetration tester as he tries to make his away into unauthorized areas, steal sensitive documents, hack into the computers, and escape with company property.This episode was sponsored by CMD. Securing Linux ...Show More
Ep 39: 3 Alarm Lamp Scooter

52:25 | May 28th

A talk at Defcon challenged people to find a way to destroy a hard drive. A young man was inspired by this challenge and was determined to find a way to destroy a hard drive. But this is not a typical young man, with a typical plan.For pictures of Da...Show More
Ep 38: Dark Caracal

56:44 | May 14th

A journalist wrote articles critical of the Kazakhstan government. The government did not like this and attempted to silence her. But perhaps they went more than just that. Perhaps they tried to spy on her. The EFF investigated this case and went dow...Show More
Ep 37: LVS

30:23 | Apr 30th

The Venetian casino in Las Vegas Nevada was the largest hotel in the world until 2015. The parent company is Las Vegas Sands (LVS) which owns 10 properties around the world. And the CEO and founder of LVS is Sheldon Adelson. One day the CEO said some...Show More
Ep 36: Jeremy from Marketing

1:03:14 | Apr 16th

A company hires a penetration tester to pose as a new hire, Jeremy from Marketing, to see how much he can hack into in his first week on the job. It doesn't go as planned.Thanks to @TinkerSec for telling us this story.This episode was sponsored by No...Show More
Ep 35: Carbanak

42:14 | Apr 2nd

ATM hacking. Hollywood has been fantasizing about this since the 1980's. But is this a thing now? A security researcher named Barnaby Jack investigated ATMs and found them to be vulnerable. Once he published his data the ATM hacking scene rose in pop...Show More
Ep 34: For Your Eyes Only

53:55 | Mar 19th

Nude selfies. This episode is all about nude selfies. What happens if you take one and give it to a vengeful boyfriend. What happens when a hacker knows you have them and wants to steal them from your phone. What happens is not good. This episode was...Show More
Ep 33: RockYou

42:33 | Mar 5th

In 2009 a hacker broke into a website with millions of users and downloaded the entire user database. What that hacker did with the data has changed the way we view account security even today.This episode was sponsored by CuriosityStream. A streamin...Show More
Ep 32: The Carder

41:29 | Feb 19th

A carding kingpin was tracked by the Secret Service. How did he steal the cards? Where was he stealing them from? How much was he making doing this? And where did he go wrong? Find out all this and more as we listen to how the Secret Service investig...Show More
Ep 31: Hacker Giraffe

58:02 | Feb 5th

In late November 2018, a hacker found over 50,000 printers were exposed to the Internet in ways they shouldn't have been. He wanted to raise awareness of this problem, and got himself into a whole heap of trouble. For show notes and links visit Darkn...Show More
Ep 30: Shamoon

37:21 | Jan 22nd

In 2012, Saudi Aramco was hit with the most destructive virus ever. Thousands and thousands of computers were destroyed. Herculean efforts were made to restore them to operational status again. But who would do such an attack? Very special thanks goe...Show More
Hackable? Presents: Keyless Entry

26:23 | Jan 15th

This week I'm playing for you an episode from another podcast I think you'd really like. It's called Hackable? and this episode is called Keyless Entry. They take the scene from Mr. Robot where they hacked into a car and test whether or not it's doab...Show More
Ep 29: Stuxnet

43:06 | Jan 8th

Stuxnet was the most sophisticated virus ever discovered. It's target was a nuclear enrichment facility in Iran. This virus was successfully able to destroy numerous centrifuges. Hear who did it and why.Special thanks to Kim Zetter for joining us thi...Show More
Malicious Life Presents: The Half Life 2 Hack

38:54 | Jan 3rd

This week I'm busy making another episode of Darknet Diaries so I thought I'd play for you an episode form another podcast I think you'd really like. This is an episode from the podcast Malicious Life. This one is about the time when a hacker got int...Show More
Ep 28: Unit 8200

50:35 | Dec 15th, 2018

Israel has their own version of the NSA called Unit 8200. I was curious what this unit does and tried to take a peek inside. Hear what I found by listening along to this episode.This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darkne...Show More
Ep 27: Chartbreakers

49:14 | Dec 1st, 2018

Something is wrong with the Apple Podcasts top charts. As a podcaster, this personally annoyed and intrigued me. I investigate how this is happening and who is behind it.For show notes visit https://darknetdiaries.com/episode/27.This episode was spon...Show More
Ep 26: IRS

37:21 | Nov 15th, 2018

The IRS processes $3 trillion dollars a year. A lot of criminals want to get a piece of that. In 2015 the IRS had a large data breach. Hundreds of thousands of tax records were leaked. What happened and who was behind this? Listen to this episode to ...Show More
Ep 25: Alberto

44:35 | Nov 1st, 2018

Alberto Hill was sent to prison for a long time for hacking. For a crime he said he did not commit. Listen to his story and you be the judge on whether he's guilty or not.Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 24: Operation Bayonet

41:12 | Oct 15th, 2018

Darknet markets are online black markets. They are highly illegal, and dangerous to run. Hear exactly how dangerous it was for Alphabay and Hansa dark markets.Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 23: Vladimir Levin

30:22 | Oct 1st, 2018

When banks started coming online, they almost immediately started being targeted by hackers. Vladimir Levin was one of the first ever known hacker to try to rob a bank. He succeeded a little, and failed a lot. Vladimir would go down in the history bo...Show More
Ep 22: Mini-Stories: Vol 1

41:41 | Sep 15th, 2018

Three stories in one! In this episode we hear about a penetration test from Mubix that he'll never forget, a incident response from Robert M. Lee which completely stunned him, and a social engineering mission from Snow.Podcast recommendation: Moonsho...Show More
Ep 21: Black Duck Eggs

28:26 | Sep 1st, 2018

Ira Winkler's specialty is assembling elite teams of special forces and intelligence officers to go after companies. Ira shares a story about a time he and his team broke into a global 5 company. A company so large that theft of intellictual property...Show More
Ep 20: mobman

45:33 | Aug 15th, 2018

Chances are, if you were downloading shady programs in the early 2000's, you were infected with malware he wrote called SubSeven. Hacking changed mobman's life. Hear how it happened by listening to this episode.Image for this episode created by dr4w1...Show More
Ep 19: Aurora

30:29 | Aug 1st, 2018

In 2009, around Christmas time, something terrible was lurking in the network at Google. Google is the most popular website on the Internet. It’s so popular many people just think Google is the Internet. Google hires many of the most talented minds a...Show More
Ep 17: Finn

47:19 | Jun 3rd, 2018

A 14-year-old kid who finds himself bored in class decides to hack someone's twitter account and ends up with more than he bargained for.Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 16: Eijah

37:40 | May 1st, 2018

In 2007, a hacker named Eijah got fed up with the way DRM prevented him from being able to play the content he paid for. He decided to fight back against the AACS and find a way to circumvent the DRM. By the time Eijah was done, his life wasn't the s...Show More
Ep 15: Ill Tills

35:21 | Apr 1st, 2018

A major retailer was hacked. Their point of sales machines were riddled with malware. Listen to hear how digital forensics and incident responders handled the situation. What malware was found? Where was it found? How was it stopped? And most importa...Show More
Ep 14: #OpJustina

26:49 | Mar 1st, 2018

In 2013 a hospital was accused of conducting a medical kidnapping against a young girl name Justina. This enraged many people across the country, including members of anonymous. A DDOS attack was waged against the hospital.Learn more about your ad ch...Show More
Ep 14: #OpJustina

33:56 | Mar 1st, 2018

In 2013 a hospital was accused of conducting a medical kidnapping against a young girl name Justina. This enraged many people across the country, including members of anonymous. A DDOS attack was waged against the hospital.
Ep 13: Carna Botnet

35:18 | Feb 15th, 2018

In 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerable in the book. A...Show More
Ep 12: Crypto Wars

30:31 | Feb 1st, 2018

In the 1990's the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be used online. A few brave people stood up to the government in the name of civil rights and won the right to u...Show More
Ep 11: Strictly Confidential

21:32 | Jan 15th, 2018

What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result.Learn more about your ad choices. Visi...Show More
Ep 9: The Rise and Fall of Mt. Gox

30:53 | Dec 15th, 2017

Mt. Gox was the largest bitcoin exchange in the world. It suddenly went offline. What happened?Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 8: Manfred (Part 2)

30:08 | Dec 1st, 2017

Manfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual goods and currency for real money. This was his full time job. Listen to this episode to hear exactly...Show More
Ep 7: Manfred (Part 1)

25:16 | Dec 1st, 2017

Manfred has had the most epic story of all online video game stories. For the last 20 years, he's been hacking online games.Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 6: The Beirut Bank Job

31:19 | Nov 15th, 2017

Jayson E. Street tells us a story about the time he broke into a bank in Beirut Lebanon.Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 5: #ASUSGATE

27:07 | Nov 1st, 2017

Security researcher Kyle Lovett bought a new Asus router in 2013. He found it was riddled with security vulnerabilties. He set out on a mission to resolve these vulnerabilities not only for his own router, but for thousands of others who were also vu...Show More
Ep 4: Panic! at the TalkTalk Board Room

40:23 | Oct 15th, 2017

Mobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metropolitan Police investigate the breach. We get a rare glimpse of how the CEO handles the crisis.Lear...Show More
Ep 3: DigiNotar, You are the Weakest Link, Good Bye!

27:15 | Oct 1st, 2017

The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached.Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 2: The Peculiar Case of the VTech Hacker

25:20 | Sep 15th, 2017

VTech makes toy tablets, laptops, and watches for kids. In 2015, they were breached. The hacker downloaded gigs of children's data. Discover what the hacker did once he took the data.Learn more about your ad choices. Visit megaphone.fm/adchoices
Ep 1: The Phreaky World of PBX Hacking

14:01 | Sep 1st, 2017

Farhan Arshad and Noor Aziz Uddin were captured 2 years after being placed on the FBI's Cyber's Most Wanted list for PBX hacking. In this episode, we explain PBX hacking and how hackers are racking up billions of dollars in phone bills. We also learn...Show More