The New Guy at the Office Is a Secret Super Hacker🎙Darknet Diaries Ep. 36: Jeremy From Marketing

341,607
0
Published 2022-08-11
Penetration testers are good guys, hired by companies to hack into their own networks by any means necessary. Pro hacker and ex-marine "Tinker" goes undercover as a marketing temp for the toughest crack of his career.

Visit darknetdiaries.com/episode/36/ for a list of sources, full transcripts, and to listen to all episodes.

All Comments (21)
  • @SneezyShadow
    This story was a roller-coaster of emotions. I half expected him to literally walk up to IT and shout at them for being at their desks during lunch.
  • @mattstorm360
    One of my favorite stories. Hacking into a broom closest. Admin isn't admin. The silent rage building leading to a mistake being made.
  • My favorite line is "what kind of locked down prison is this". Great work
  • @jaymiller2268
    This is, in my opinion, one of the 3 best episodes. An absolute gem! Another great one is Ep 21 "Black Duck Eggs". Phenomenal work!
  • @Nathanfx2006
    This was an incredible story, i could almost feel the frustration while listening. Hearing a win for the blue team is a nice change of pace!
  • @brad6817
    I love this guy so determined and when he gets frustrated and desperate it made me laugh. Really good example of some good security.
  • @ericf423
    Honestly this is my favorite channel now
  • Wow, this episode of Darknet Diaries was intense! I couldn't believe the level of dedication and determination that Tinker had as he went undercover as a marketing temp. The way he was able to hack into the company's network by any means necessary was impressive. The frustration and tension throughout the story made it an emotional roller coaster. A definite must-listen episode, in my opinion.👏
  • As a former network engineer from the old days I loved this listen. Incredible how advanced the technology has actually become and yet the rules haven’t changed
  • @GU716
    I absolutely respect Tinker for sharing his story. I was at the edge of my seat the entire time!
  • @IsaacSMILE
    Totally addicted to your work Jack! Geek heaven!
  • @danbrown4420
    Pentesters are a great sort in my experience, I learned a helluva lot from every single one that's been on our site. They can learn a thing or 2 from us Sysadmins too however, 1st guy I supervised "mysteriously lost connection" and started querying our blocking of IP scans etc. - Told him I'd need to confirm with Networks, but that 1st he should plug back in the LAN cable from his machine that he'd just kicked out of the floorport under the desk... 😅
  • I'm speechless! this episode should be a MUST listen to everyone in the InfoSec domain! so many lessons to be learned here! phenomenal!
  • @werewolfdev
    I have a "Writing" playlist on YouTube. Half of those videos talk about writing advice, expertise, tips & tricks, etc. The other half is non-fiction storytelling which provide inspiration for my own fiction writing. This video fulfilled both criteria: A 3-act structure, the hero's journey, a tale of the hacker that couldn't, and even a moral. Truly a podcast where fairytales are born.
  • Even as a very technical person, I love your ability to properly explain everything. I'm a Web Developer Instructor, and I find it difficult to explain things to my students without overwhelming them. So I've been digging through your blogs and everything, and I really appreciate what you do sir.
  • @hazonku
    Jeremy from Marketing thought he was going to spend five minutes at his desk and say, "I'm in!" LOL. But for real though, that's some INSANE security they had. I don't know who that company is but they definitely did their homework.
  • @teddy7746
    My uncle was a professional high end car thief for like 15 years then he went to prison and now car companies hire him to test there cars security.
  • @jtw-r
    wow, i normally don’t listen to hacking related podcasts, although i do watch a fair bit of shorter youtube videos about similar topics … but this was just entirely captivating and it could have easily been another hour! great job!!
  • I bet if he sat tight and waited it out for a few days, he could have gotten that IT access that he needed to continue on with the powershell and nobody probably would have caught it.