Skip to main content
Layer 8 Podcast

Layer 8 Podcast

By Layer 8 Conference
In season two of the Layer 8 Podcast, we'll talk to the experts, social engineers and open source intelligence investigators. Sometimes, they'll tell us stories of their experiences, and sometimes we'll have questions for them. We hope you enjoy listening!
Listen on
Where to listen
Apple Podcasts Logo

Apple Podcasts

Breaker Logo

Breaker

Castbox Logo

Castbox

Google Podcasts Logo

Google Podcasts

Overcast Logo

Overcast

Pocket Casts Logo

Pocket Casts

RadioPublic Logo

RadioPublic

Spotify Logo

Spotify

Stitcher Logo

Stitcher

Currently playing episode

Episode 30: Brent White and Tim Roberts

Layer 8 Podcast

1x
Episode 77: Lorand Bodo - Using OSINT to Find Extremists
For this episode, we talked with Lorand Bodo, one of the creators of OSINT Curious. Lorand talks with us about how he recommends people get started with OSINT, what OSINT is and then takes us through some stories about how he tracks jihadists and extremists. He also tells us about his role with OSINT Curious and the webcasts and streaming events that he puts on with them. Lorand also has a weekly updated list of curated tweets from extremists on his web site, lorandbodo.com
48:19
September 20, 2021
Episode 76: Alethe Denis - Creating Pretexts for Social Engineering
Alethe Denis is an amazing accomplished social engineer. She won the Social Engineering Capture the Flag competition at Defcon 27. She was part of a team that won a Trace Labs OSINT Capture the Flag competition. She will again be a judge at the Collegiate Social Engineering competition. She created the Defcon 209 chapter in California, and is the original ambassador to the Innocent Lives Foundation. In this episode, Alethe takes us through her pretext preparation for Defcon and how she creates pretexts for social engineering. She breaks down some of the principles of persuasion that she talks about in her presentation "Phishy Little Liars" and lets us in on an attempted financial scam against her that she exposed. 
01:00:27
September 13, 2021
Episode 75: Rae Baker - Maritime OSINT, Breaking In and OSINT Competitions
For this episode, we get to speak with Rae Baker, also known as Wondersmith_Rae on Twitter. Rae changed careers a few years ago from a graphic designer to the world of OSINT. Along the way, she has competed in and won OSINT competitions, given presentations at BSides, ShmooCon and most recently, Defcon's Recon Village. She has some great advice for how to get into the field and also how to succeed in an OSINT Capture the Flag competition. Rae is on the executive board of OSINT Curious and is also a volunteer with the Innocent Lives Foundation.
38:59
September 6, 2021
Episode 74: Robin Dreeke - Social Engineering Tradecraft
TW: Brief discussion of sexual assault/abuse. For this episode, we got to speak with Robin Dreeke, a 29 year veteran of federal service, including the US Naval Academy, US Marine Corps and the head of the FBI's Counterintelligence Behavioral Analysis Program. Robin owns https://peopleformula.com where he offers skills, newsletters, training classes and his books. In this conversation, we reference his books as we talk about building rapport and Robin's five basic principles of trust: 1) Suspend Your Ego, 2) Be Nonjudgemental, 3) Validate Others, 4) Honor Reason, 5) Be Generous.  Robin's books discussed in the episode are:  It's Not All About "Me" Sizing People Up Code of Trust When we discuss validation, we referenced a video on YouTube that demonstrates the concept titled "It's Not About the Nail".
49:01
August 30, 2021
Episode 73: Vishing with Curt Klump
For this episode, we talk voice phishing, or vishing, with Curt Klump. Curt is a hacker with Social Engineer, LLC and he gets to hack people simply by calling them on the phone. We got to talk with Curt about how he went from being an actor to a social engineer, how to get started in the industry, great resources for learning, tips for particularly difficult environments and he shares stories of some of his favorite compromises and shut downs. 
39:56
August 23, 2021
Episode 72: Onderdompelen with Technisette
For this episode, we are joined by Lisette Abercrombie, probably better known as Technisette. She is a Dutch OSINT investigator and one of the creators of OSINT Curious. We get to talk about her OSINT methodology, some tips and tricks and she shared two stories of her investigations. One that included the value of the color of garbage barrels in an image. We also learned the Dutch term "onderdompelen" meaning to submerge or immerse yourself. Jump in the deep end and start swimming! 
42:05
August 16, 2021
Episode 71: The Art of Attack with Maxie Reynolds
For this episode, we get to talk with Maxie Reynolds about her new book, "The Art of Attack: Attacker Mindset for Security Professionals". She talks about her four laws of attack and the skills necessary to be successful. These skills can help you as a social engineer as well as in other areas of life. Maxie is the Technical Team Lead at Social Engineer LLC where she also co-teaches the Advanced Practical Social Engineering course, co-hosts the Social Engineer Podcast, is involved with the Innocent Lives Foundation and you can find her on Instagram.
36:37
August 9, 2021
Episode 70: The OSINT Dojo with Sinwindie
For this episode, we get to talk with Sinwindie. He got his start in law enforcement, learning tools of the trade in open source investigations. Eventually, Sinwindie had the idea to create the OSINT Dojo, a free online resource where people can learn the strategy and methodologies necessary to become better at OSINT investigations. Additionally, if one follows the progression through the Dojo, they'll have tangible results that can be shared with others or assist in job searches.
43:47
August 2, 2021
Episode 69: Natalia Antonova - GeoLocation Challenges and Keeping Safe Online
For this episode, we hear from Natalia Antonova, a journalist, a researcher and an OSINTer. She frequently posts on Substack at https://nataliaantonova.substack.com/ where she has given Geolocation challenges, tips for spotting a catfish, and using Google Lens, among other topics. She also posts on Twitter at @NataliaAntonova. Check out this episode for her tips on how to avoid online stalkers, why she posts photos of herself and challenges people with "Where am I?" and about learning human psychology.  And please join us for the Layer 8 Conference, happening online, October 8th. https://layer8conference.com 
51:31
July 26, 2021
Episode 68: Kate Kelley - The Photo Angel
In this episode, we talk with Kate Kelley, also known as The Photo Angel. Kate connects old photos with relatives of those in the photo. She uses OSINT techniques to locate the family members, often starting with little information. Kate finds the photos in antique stores and then goes to work on finding the family members. She also runs a Facebook group where she and others share stories of successful connections. The group is also named The Photo Angel. Kate was also recently featured in the Boston Globe, in an article describing her project.
20:28
July 19, 2021
Episode 67: "Lead with What Makes You Good" by Charles Hein Wroth
In this episode, we speak with @AngusRedBlue, Charles Hein Wroth. Charles founded redherd.io and is a technical recruiter, but not your typical recruiter. Charles is a technical recruiter who understands the technical aspects of security, has given presentations at security conferences, regularly volunteers at conferences and also created Hack South, a South African infosec community. Charles also competes in the Trace Labs OSINT competitions. Charles tells us what he looks for in technical candidates, the value of certifications, how to get experience without having experience and his recommendations on how to make your resume stand out and catch the eye of the hiring managers. 
51:42
July 12, 2021
Episode 66: Micah Hoffman - His Origins in Infosec and in OSINT
Micah Hoffman, known as WebBreacher on Twitter is a pioneer in the OSINT field. He created his own company, Spotlight Infosec, he created and teaches SANS 487: Open Source Intelligence Gathering and Analysis and also created OSINT Curious. We talked with Micah about how he got his start in infosec, how he started in OSINT and a little about Impostor Syndrome and feelings. Micah also gives advice on getting started and about OSINT strategy vs. tools. 
58:08
July 6, 2021
Episode 65: ILFest with Shane McCombs, Mandy Cox and John McCombs
The second annual ILFest will begin at 11 am US ET on July 10th and available on Twitch.tv. In this episode, we hear from Shane, Mandy and John about what the Innocent Lives Foundation (ILF) is, the type of work that they do to unmask predators of children online and how they work with law enforcement to take these people off the streets. We'll hear about ways they raise money at ILFest including a "Sandwich of Suffering" which might be much to Chris Hadnagy's chagrin. 
46:18
June 28, 2021
Episode 64: The Sweet Old Lady and the Devil by Sam Moses
We are joined by our good friend, Sam Moses, who generally goes by Moses. He tells us two stories of phishing and vishing engagements. He talks about the OSINT he performed and shows its value. He takes us through the ups and downs of calling people and how sometimes, no matter how prepared you are, there can still be an unforeseen curve thrown at you. He also tells us about a really nice conversation with The Sweet Old Lady and all the fun information she shared with him. Moses also gives advice on how to defend against these types of calls and how someone can get started as a social engineer! 
37:08
June 21, 2021
Episode 63: Joe Gray's Book Release - Practical Social Engineering
For this episode, we talk with Joe Gray, also known as @C_3PJoe on Twitter. His web site is https://www.theosintion.com, a destination for OSINT and social engineering training. Joe is an accomplished conference speaker and won the social engineering capture the flag competition at DerbyCon. Joe tells us about a couple of his favorite presentations and projects he has worked on, how to get started in the OSINT industry and tells us about his book Practical Social Engineering, available from No Starch Press. There is even a free chapter available for download! 
57:09
June 14, 2021
Episode 62: Jonathan Younie - Social Engineering from a CISO's Point of View
On this episode, we talked with Jonathan Younie, aka @InfosecCanuck. Younie is a CISO for a financial services firm and a social engineer. He talks with us about his experience at the recent Human Hacking Conference, and the lessons he brought back for his own company's social engineering training. Younie has also created and is a part of social engineering and OSINT professional networking groups on Clubhouse and Slack. Younie also gives us a little bit of information about the upcoming ILF Fest, being run by the Innocent Lives Foundation and the associated "Sandwich of Suffering" that could be in Chris Hadnagy's future.
34:46
June 7, 2021
Episode 61: Polarisu Solves the OSINT Challenge
On April 3, we re-shared a photo from a friend of a building and asked "Where is this?" People from literally around the world began searching, and it wasn't until the following day when Marlena von Hoffer, aka @Polarisu used her skiptracing OSINT skills to finally locate the building in the image. In this episode, Marlena tells us about the tools, techniques and strategy she used to eventually figure out the location. She also tells us a fun story of how she was able to locate someone using only incomplete information.  The original image that we were searching for can be found here: https://twitter.com/Layer8Con/status/1378372070153785346
37:38
May 31, 2021
Episode 60: Breaking Into Buildings with Crystal
For this episode, Crystal aka UnluckyNum7 joins us to talk about her methods and strategy for bypassing security controls to access buildings. She talks about what she did when faced with locked doors during an upstate New York winter, or when the elevator required a valid badge to get to floors and what she came up with when someone asked what she will bring to the company holiday party. All this and more in today's fun episode! 
27:39
May 24, 2021
Episode 59: Twig - Identifying Locks and Vishing Her Targets
For this episode, we welcome our friend Twig. Twig is a member of IBM’s X-Force Red and a social engineer. She tells us about a lock identification tool that she created and presented at Shellcon. She also takes us through a vishing engagement and the various strategies that she uses.
20:59
May 17, 2021
Episode 58: Siobhan Kelleher - "Be Stubborn and Want to Learn"
For this episode, we're joined by Siobhan Kelleher, also known as @Secure_Coffee. Siobhan's day job is in higher ed but she got introduced to OSINT by joining in to a Trace Labs Capture the Flag competition at the 2019 Layer 8 Conference. She has worked in sales, so she's also always had a knack for social engineering, plus it appears to run in her family. Let's hear from Siobhan about the strategies and many tools that she has learned to use during her OSINT investigations. 
22:57
May 10, 2021
Episode 57: Collegiate Social Engineering Capture the Flag Organizing Team
The main organizers of the Collegiate SECTF include Temple University's CARE Lab of Professor Aunshul Rege, Rachel Bleiman and Katorah Williams, plus Patrick Laverty from Layer 8 Conference. In this episode, the team discusses the origins of the SECTF, how it works, who can compete, as well as the impressions of the competition by graduate students Rachel and Katorah. If you are a college student and would like to compete in this tournament, this is a can't miss episode!
01:04:16
May 3, 2021
Episode 56: Michele Stuart - Evolution of OSINT Tools and Talking Her Way Into a Super Bowl Party
For this episode, we speak with Michele Stuart of JAG Investigations. Michele is a social engineer and OSINT investigator. She also offers training on her strategies and techniques. Michele tells us about the OSINT tools that she used when she first got started in the field, which was before searching on the internet became common. She also tells us how she talked her way into a Super Bowl party and also ended up selling raffle tickets at a holiday party!
43:10
April 26, 2021
Episode 55: Magic and Social Engineering with Lee Anderson, Richard Davy and Chris Kirsch
For this episode, we speak with three social engineers who are also hobbyists in the art of magic. Magic is often about deception, distraction and sleight of hand techniques. We'll talk with Lee, Richard and Chris about how they got started learning these techniques, as well as some of the psychology needed to make people believe the tricks and find the overlaps with social engineering. 
01:07:43
April 19, 2021
Episode 54: Searching the Dark Net with Levitannin
What is the dark net, the dark web, the clear web and the differences between them? For this episode, we'll hear some fun stories from Levitannin, an OSINT researcher and Innocent Lives Foundation volunteer. Are Red Rooms real? And what are some of the places to look for some of the rumored illicit information that is on these layers of the internet? Join Levi today and find out all this, plus even more! And you can also join Levi for the Innocent Lives Foundation gamer streams on Twitch!  If you enjoyed this episode or any others here, please donate to the Innocent Lives Foundation. 
36:26
April 12, 2021
Episode 53: Collegiate SECTF with Ragnhild "Bridget" Sageng, Prof. Aunshul Rege and TinkerSec
From October 2nd to 4th, six teams competed in the first ever Collegiate Social Engineering Capture the Flag competition at Temple University. They were tested on their ability to perform OSINT, create a phishing email and even make phone calls to gain information. This episode speaks with the creator of the competition, Professor Aunshul Rege and the winner of the competition, a one-woman team from Noroff University College in Norway, Ragnhild "Bridget" Sageng. We also have one of the judges with us, our long time friend and all around great person, TinkerSec! Stay tuned for announcements about the second annual competition, coming soon!
01:29:16
April 5, 2021
Episode 52: Tokyo_v2 - Anonymous Reviews Might Not Be So Anonymous
For this episode, we welcome our friend Tokyo. Tokyo is a member of Team Searchlight community, and is the author of many blog posts on OSINT investigations. Today, Tokyo shows us the steps, methodology and tools that can be used to trace a single online review all the way to the person who left it. 
12:40
March 29, 2021
Episode 51: Stefanie LaHart - The Defcon Social Engineering Capture the Flag Experience
For this episode, we hear from Stefanie LaHart. Stefanie is an expert social media strategist and podcaster who has competed in the Defcon social engineering capture the flag competition twice! She tells us how she got into the competition as someone who was unfamiliar with the terms social engineering and OSINT, showed up to the competition without much of a strategy and figured it out on the spot. She also tells us about what happened when a person from her competition target was in the audience, listening to her vishing calls. This summer, Stefanie has a book being released, she has a class on safe online dating for women as well as many social media tips, tricks and strategies. You can find all of this and more at http://StefanieLahart.com.
48:01
March 22, 2021
Episode 50: BOsintBlanc - Let's Talk Methodology
For this episode, we welcome BOsintBlanc. He loves to use OSINT tools and loves to help others with their OSINT skills. But there's one thing that he'd love to see everyone do before using tools. That is to develop a solid methodology and mindset around the OSINT process. In this episode, he talks about how he got started in OSINT and other tips and tricks to refining your own methodology. Also, he asks that you consider making a donation to the National Child Protection Task Force, where he volunteers. 
21:11
March 15, 2021
Episode 49: Nicole Beckwith - Going Undercover for Roses and the PornHub Interview
For this episode, we welcome Nicole Beckwith. Nicole is a Staff Cyber Intel Analyst with GE Aviation. She previously worked in law enforcement and was tasked with going undercover into the world of sex work. She played the role of a sex worker and explains all the background and research that went into it, learning the language, the acronyms, the signal words and ways to protect herself in the job. She also tells a second story of a night when one unsuspecting person crossed paths with Nicole and other social engineers and inadvertently began an interview for PornHub. 
28:60
March 8, 2021
Episode 48: Phillip Wylie - Pwn School, Pentester Blueprint, and Wrestling a Bear!
In this episode, we talk with Phillip Wylie. Phillip is a former professional wrestler turned hacker and now teacher, and an ambassador to the Innocent Lives Foundation. Please donate today on Phillip's page! Phillip works as an offensive security instructor for INE, he created the Pwn School, co-authored The Pentester's Blueprint with Kim Crawley which he also turned into a conference presentation, and also co-hosts the podcast The Uncommon Journey with Alyssa Miller and Chloe Messdaghi. Phillip tells the lessons he imparts on his students, getting into pentesting as well as the crossover of social engineering into his professions in jewelry sales and professional wrestling. Oh, and did you hear he wrestled a bear?
45:13
March 1, 2021
Episode 47: Deviant Ollam - The Covert Entry Specialist
For this episode, we speak with @DeviantOllam who runs both the Core Group and Red Team Alliance. Deviant is also the author of two books, Practical Lock Picking: A Physical Penetration Tester's Training Guide and Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks. Today, Deviant tells us three stories of covert entry, including much of his strategy, tips, techniques and the social engineering that goes into an engagement. He also tells us of the most difficult building he has ever had to enter and what made it so difficult for him.
41:55
February 22, 2021
Episode 46: Ryan MacDougall and Curt Klump - Using OSINT to Get the Win!
For this episode, we talk with Ryan MacDougall, the Chief Operating Officer at Social-Engineer.org and Curt Klump, a Human Risk Analyst, also at Social-Engineer.org. They tell two stories of using OSINT during social engineering engagements. In Ryan's, he shows how sometimes no matter how deep you dig, it might not be enough. In Curt's story, he tells us about ways that he was able to use OSINT to find a ghost.  Curt and Ryan also join us to talk about the upcoming Human Hacking Conference on March 11th to 13th, 2021. If you sign up now, use the Promo Code L8HHC100 to get $100 off your registration price! 
16:26
February 15, 2021
Episode 45: Zlata Pavlova - Доверяй, но проверяй
Доверяй, но проверяй - Doveryai, No Proveryai (Trust, but verify) For this episode, we welcome Zlata Pavlova aka @3latka_ on Twitter. By day, Zlata works with InGuardians but she is also working with OSINT and social engineering. Zlata speaks multiple languages which is a big asset with the type of OSINT she does. Today, she walks us through the steps that a hacker took to take control of a celebrity's Instagram account.
26:26
February 8, 2021
Episode 44: Jon Nichols and John Kirbow - PsyOps and Disinformation Campaigns
For this episode, we talk with Jon Nichols, aka @WVUAlphaSoldier and @JohnKirbow, two men trained by the US military in psychological operations and disinformation. We talk with them about current disinformation campaigns, where they come from, how they work and how people can start to understand each other again. 
01:08:46
February 1, 2021
Episode 43: Benjamin Strick - OSINT Takedown of West Papua Disinformation
For this episode, we welcome Benjamin Strick, also known as BenDoBrown on Twitter. Ben tells us of an investigation that he published for Bellingcat where he was seeing contrasting information coming from Indonesia during a genocidal event. He began digging in, starting with a Twitter timeline that was publishing videos and eventually got to the source, but not without experiencing death threats for his work along the way.  You can find Ben's writeups here: https://www.bellingcat.com/news/rest-of-world/2019/10/11/investigating-information-operations-in-west-papua-a-digital-forensic-case-study-of-cross-platform-network-analysis/ and here: https://www.bellingcat.com/news/2020/11/11/west-papua-new-online-influence-operation-attempts-to-sway-independence-debate/
21:21
January 25, 2021
Episode 42: Edward Miro - Social Rideshare Experience and Hacking Your Own Brain
We welcome Edward Miro to this week's episode. You can find his work on YouTube at https://www.youtube.com/MiroLabs or his own site, https://mirolabs.info. In this episode, Edward walks us through his start in the field as he gave a presentation in the Defcon Social Engineering Village to hundreds of attendees, and he talks about social tips he learned as a rideshare driver and also tells us how we can hack our own brain. 
30:35
January 18, 2021
Episode 41: Leon Johnson and Shane Young - Pwning the Check Casher
Two expert social engineers, Leon (“sho_luv“) Johnson and Shane (“t1d3nio“) Young are assigned to infiltrate a financial institution. In this episode, they tell us how they went on the roof, to the basement, got into the safe and even got some valuable shirts for themselves.
33:40
January 11, 2021
Episode 40: Hakeem Thomas - The Unredaction Expert
Hakeem Thomas tells us about his start in OSINT, beginning with a Capture the Flag competition where he got a simple, helpful tip that led him in a career direction. He also became the expert at being able to unredact a great deal of hidden information in documents, some of which he'll share with us. You can find Hakeem on Twitter at @S6Vet_Infosec
14:31
January 4, 2021
Episode 39: Jenny Radcliffe - The Cat and the Cake (and the Open Window)
We get to talk with social engineer and fellow podcaster Jenny Radcliffe as she tells us a couple great stories. The first story is one that she has never told before, and the second one is what she did when on an SE job and faced with a birthday cake, a cat, and an open window. You can see Jenny's work and check out her podcast at https://humanfactorsecurity.co.uk
20:14
December 28, 2020
Episode 38: Tigran Terpandjian - The Experience Catch-22
We have Tigran Terpandjian, also known as Th3CyF0x talking to us about how he also faced the common Catch-22 of needing experience to get a job, but how do you get the experience without a job. He talks about the strategies that he used and gives tips on things others than try too. You can also ask Tigran about his love of foxes and ramen! 
17:47
December 21, 2020
Episode 37: Billy and Vache - Flair Bartending and SE
This is an interview episode with Billy (@fuzzy_logic) Boatright and Vache (@flying.v) Manoukian. These guys are social engineers and flair bartenders. During this interview, Billy and Vache talk about how quickly the build rapport and some of the tips and tricks they have for winning people over quickly. 
37:10
December 14, 2020
Episode 36: Inês Narciso - Teamwork Makes Dreamwork
Our friend, Inês Narciso talks about how to best use multi-disciplinary teams to be most efficient during OSINT and social engineering investigations. She talks about bringing together specialists to create teams that will better get the needed information.  You can find Ines on Twitter at @IWN_LX and she also presented at the Layer 8 Conference in 2020 on OSINT’s Role Tackling Disinformation In Portuguese Elections 
20:05
December 7, 2020
Episode 35: Joshua Richards - Buying/Selling Body Parts on the Dark Web
Joshua Richards, is also known as AccessOSINT on twitter and can be found as an administrator on the Searchlight Discord server. Josh was doing a little searching on the dark web one day and found someone looking to sell human body organs. In this episode, he tells us how he used OSINT to discover the identity of the person, and hand that information off to law enforcement officials.  You can read Josh's blog at https://accessosint.com/
23:21
November 30, 2020
Episode 34: Shelby Dacko - ScaryLilHuman in the Trash Chute
For this episode, Shelby Dacko, also known as @ScaryLilHuman tells us how she got started as a social engineer, and also about one engagement where the team was running into roadblocks. That is, until they discovered one path into the server room was through a very narrow trash chute that only a small person could fit through. Shelby fit the bill.  Catch Shelby teaching a course on vishing at the Human Hacking Conference from March 11th to 13th. 
11:19
November 23, 2020
Episode 33: MangoPDF - The "Don't Get Arrested Challenge"
MangoPDF, also known as Alex Hope is from Australia. One day, a friend asked him what information can he get from a simple boarding pass. With this, the "Don't Get Arrested" challenge began. What information can one person get from a boarding pass, what kind of legal trouble might it lead to and who might even call your phone. All things Alex found out!  You can follow along with Alex's story on his blog at The Mango.PDF.Zone! 
36:18
November 16, 2020
Episode 32: Marina Ciavatta - Tropical Spy: Stories And Tricks From Social Engineering
Here is Marina's presentation from the Layer 8 Conference. She did not want the video released but allowed for the audio. 
43:14
June 29, 2020
Episode 31: Joe Gray - His Origins and a Phish
For this episode, we welcome Joe Gray, a senior OSINT specialist at QOMPLX, a frequent public speaker at conferences and trainer of OSINT and social engineering. Joe joins us to tell us how he got into the field and how he got to where he is today. He also tells a second story about a particular phishing engagement where a senior manager built him up as someone who was unstoppable. But was he? Let him tell you how that went.
22:59
June 29, 2020
Episode 30: Brent White and Tim Roberts
For this episode, we veer off course again. This time, to talk with Brent White and Tim Roberts from NTT Security and their own site wehackpeople.com. One day, Brent asked on twitter what types of things people would want to know about social engineering and he got some great questions. I asked and he and Tim agreed to answer those questions on this podcast. Let’s hear their answers now.
51:58
June 22, 2020
Episode 29: Social Engineers from Rapid7
For this episode, we talk with three expert social engineers from Rapid7. Leon Johnson, Aaron Herndon and Jonathan Stines will tell us about some of the best security they’ve seen, some of the worst, some of the tools they carry on an engagement and how they sleep at night, knowing it is their job to trick people.
57:34
June 15, 2020
Episode 28: Josh (@Baywolf88) Huff
For this episode, we welcome Josh Huff, but you might know him as BayWolf88 on Twitter. He is a member of the OSINTCurious Advisory board and runs the web site LearnAllTheThings.net. In his experience doing digital forensics, he learned how to best frame information for those who hired him, which also helps with his OSINT investigations. Plus, he talks about how he dabbles in social engineering! 
16:31
June 1, 2020
Episode 27: TrustedSec Social Engineers Ask Me Anything
For this episode, we have another Ask Me Anything treat for you. Today’s guests are four social engineers from TrustedSec. We’ll hear from David Boyd, Paul Koblitz, Scot Berner and Jason Lang. Let's talk about their favorite engagements, some times when things went well, and some engagements that didn’t go so well and how they handle the situation when an engagement goes upside down. We’ll hear of one time when a medical procedure almost went too far and plus some resources on how to get started in social engineering.
56:04
May 25, 2020
Episode 26: Krittika Lalwaney - One Woman's Domination in a Male Dominated Field
For this episode, we welcome Krittika Lalwaney. Krittika is a red teamer on the offensive security team for Capital One. She is a social engineering capture the flag black badge winner at DerbyCon in 2018. She takes us through her career path, where she started, which was not in IT, to eventually joining a SOC, catching a red teamer due to her awareness, all the way to her successes of today. This is a story of one woman’s domination in a male dominated field. Take it away Krittika!
23:12
May 18, 2020
Episode 25: Tracy Z. Maleeff, a.k.a. The InfoSecSherpa
For this episode, we welcome Tracy Z. Maleeff, also known as InfosecSherpa. He has a blog set up at medium.com/@infosecsherpa and a newsletter at nuzzel.com/infosecsherpa. Tracy harkens us back to her presentation from Layer 8 Conference last year titled Lawyers, Guns and Money where she showed us great sources of OSINT research. Today, she gives us even more sources to search and explains how at the heart of it, security is a people problem so let’s also focus on interpersonal communications.
53:28
May 11, 2020
Episode 24: OSINT AMA with Noneprivacy and Ding0snax
For this episode, we break our format again and interview two OSINT experts, Francesco Poldi and Jason Edison. Also known as @NonePrivacy and @Ding0snax on Twitter. These two are commonly found sharing information on the https://osint.team server. In this “Ask Me Anything” find out their thoughts on an OSINT mindset, some investigations they have dug in to, what gets them excited and how you can also be a better OSINT investigator.
48:52
May 4, 2020
Episode 23: Amanda Berlin - The $15,000 Teddy Bear
For this episode, we welcome Amanda Berlin of Blumira. She is also the CEO of the non-profit organization Mental Health Hackers, and can be found on twitter at InfoSystir. Today, she tells us about a romance scam where she helped a friend finally understand she was being duped, and explains how these work, plus she’ll tell us a little bit about a fifteen thousand dollar teddy bear.
12:27
April 27, 2020
Episode 22: Derrick Levasseur - Going to College...for the Bust
For this episode, we welcome Derrick Levasseur, winner of Big Brother season 16, host of the Discovery ID tv show Breaking Homicide and the author of the best selling book, Undercover Edge, which helps you find your strengths and gain confidence to win in all situations. Derrick tells us the story about the first time he went undercover as a police officer and the methods he used to quickly gain the trust of a university drug dealer over a few games of pool that eventually led to a bust.
21:13
April 20, 2020
Episode 21: Adam Compton - The Ladder and the Big Gulp
For this episode, we welcome Adam Compton, a pentester and social engineer for TrustedSec. You can also meet TrustedSec at the Layer 8 Conference, and you can find Adam on twitter at Tatanus. Adam talks about the various ways and methods that he was able to successfully test the physical security of a health care facility, using the remnants of a Big Gulp and a ladder in the snow, as well as simply asking for a tour.
18:17
April 13, 2020
Episode 20: Ritu Gill - Tips and Tricks from OSINTtechniques
For this episode, we welcome Ritu Gill, also known as OSINTTechniques on twitter and at osinttechniques.com. First, Ritu helps us to understand the differences between intelligence and data. Then she takes us through some examples of combinations of OSINT and social engineering. In one such example, she finds a way to get a target to reveal his real name on Facebook. She also tells us about canary tokens and phone spoofing.
11:07
April 6, 2020
Episode 19: Jayson E. Street - "One of the Best Stories I Can Tell"
For this episode, we welcome Jayson E. Street, VP at SphereNY and will be teaching a two-day course at Blackhat titled “Access Denied - Social Engineering Detection and Incident Response”. Jayson tells us about a huge success for him, getting caught. Physical social engineers are often able to breach a company’s physical defenses, but are we teaching the client how to improve? Jayson proudly tells us about one incredible success story.
23:55
March 30, 2020
Episode 18: Christina Lekati - They Never Saw Her Coming
For this episode, we welcome Christina Lekati, a social engineer and psychologist for Cyber Risk Gmbh in Switzerland. You can find her on twitter at ChristinaLekati. Christina was tasked with confirming one client’s suspicions that their employee was stealing information from them. In this story, you’ll hear that the target had no idea what was coming for him once Christina got started.
21:37
March 23, 2020
Episode 17: AMA with Snow and TinkerSec
Warning: Some language used is NSFW or children. For this episode, we break our format. Usually, we have a social engineer or OSINT investigator on to walk us through a great story, a fun engagement or the methodology of an investigation. On this episode, we welcome two extremely accomplished social engineers, Snow and TinkerSec to just chat, answer a few questions, give opinions and recount a lot of fun stories. You can find them on Twitter at @_sn0ww and @TinkerSec.  In this episode, Snow mentions her Full Scope Social Engineering class being taught at BlackHat USA. You can find out more about that class here: https://www.blackhat.com/us-19/training/schedule/index.html#full-scope-social-engineering-and-physical-security-14232 
01:12:35
March 19, 2020
Episode 16: Julie Clegg - Top 5 Things Not Seen on Hunted
For this episode, we welcome Julie Clegg, the OSINT expert on the United Kingdom-based television show "Hunted". Julie is also putting together OSINT2020, an event where OSINT investigators can come together and talk about the future of investigations. You can find out more at OSINT2020.com. Julie talks with us about her five favorite events that happened on Hunted but you didn’t get to see on television. She talks about various activities by the hunters and some pranks that the hunters and hunted played on each other. You can contact Julie on Twitter at @HuntedJulie
25:48
March 16, 2020
Episode 15: Cat Murdock - Know Your Name and Bring Snacks
For this episode, we welcome Cat Murdock, a security consultant and social engineer from Guidepoint Security. You can find Cat on Twitter at CatMurd0ck. While most of our episodes are safe for work, this one has a few words mixed in that you might not want children to hear. Cat takes us through some of her social engineering encounters, explains why snacks and bathroom breaks are important and why the names on paperwork are very important.
42:07
March 9, 2020
Episode 14: Dutch_OSINTGuy - Spot the Jihadi
For this episode, we welcome Nico Dekins, also known as Dutch OSINT Guy and a co-host of the OSINT Curious podcast. You can find Nico on Twitter at Dutch_OSINTGuy. Law enforcement officials in the Netherlands asked him to confirm whether a potential Jihadi’s threats were credible. They only gave him a first name and minimal other information. Find out how Nico went through his methodology to get the confirmation they needed.
17:26
March 2, 2020
Episode 13: Alethe Denis - Social Engineer Your Own Brain
For this episode, we welcome Alethe Denis, the founder of Dragonfly Security and the reigning champion of the Defcon social engineering capture the flag competition. This is Alethe’s story of where she came from, how she was always a social engineer from childhood and also how words from Lady Gaga turned her life around. She tells us how we can social engineer ourselves to move in a positive direction.
53:21
February 24, 2020
Episode 12: Keith Cox - The Value of Flexibility During Vishing
For this episode, we welcome Keith Cox, a social engineer and pentester from Rapid7. Keith takes us through a recent vishing engagement and he tells us how sometimes you can learn from the initial calls you make to drastically change your pretext and how it worked for him. Keith also describes how he got to flip the script a little and help his mentor fine tune his own social engineering skills.
47:28
February 17, 2020
Episode 11: Kirby Plessas - Happy Birthday...or is it?
For this episode, we welcome Kirby Plessas, host of the OSINT curious podcast. She is the founder and CEO of the Plessas Experts Network, found at plessas.net where you can find online training about how to perform OSINT investigations. Kirby tells us how she was able to track down a hacker, simply because someone wished him happy birthday.
08:48
February 10, 2020
Episode 10: Marina Ciavatta - Just Ask For Feedback
For this episode, we welcome Marina Ciavatta, the journalist turned social engineer, from Brazil. Marina describes her first physical social engineering engagement where she will tell us how she successfully bypassed biometrics and how people will willingly give you more information if you just ask. You can find Marina on Twitter at: @MarinaCiavatta
47:28
February 3, 2020
Episode 9: Wondersmith Rae - Unraveling an Online Puppy Scam
For this episode, we welcome Wondersmith Rae, a professional OSINT investigator who tells us the story of an online puppy scam. This is a story where pulling on one thread of information seemed to lead down varying paths and exposing additional interesting areas to investigate. She and @Tokyo_v2 also wrote a blog post on Medium.com about her investigation titled “Anatomy of a Puppy Scam, Part 1, Meet Layla” where you can find even more details. You can find her on twitter at @Wondersmith_Rae
19:09
January 27, 2020
Episode 8: Deveeshree Nayak - Turning a Facebook Feature into a Ticket to Defcon
For this episode, we welcome Deveeshree Nayak, an educationalist and information security professional where she tells us about how she was able to find weaknesses in Facebook for gathering information on friends of friends, which eventually led to the company inviting her to Defcon. You can find Deveeshree on LinkedIn.
07:13
January 22, 2020
Episode 7: Robby Stewart - Sometimes the Client Wins
For this episode, we welcome Robby Stewart, a social engineer and pentester at Rapid7. Robby tells us about a story that we don’t hear that often from social engineers...failure. He explains why some might consider his test a failure and why some would call it a success. You can find Robby on Twitter at @RizzyRong.
10:04
January 21, 2020
Episode 6: Robby Stewart - How a Social Engineer (Ab)uses Trust
For this episode, we welcome Robby Stewart, a social engineer and pentester at Rapid7. Robby takes us through the first social engineering engagement and the various decisions he needed to make along the way. He also explains how a good social engineer can really take advantage of people’s assumptions and their trust. You can find Robby on twitter at @RizzyRong
07:55
January 20, 2020
Episode 5: Matthias Wilson - Combining OSINT with SE in Germany
For this episode, we have Matthias Wilson, also known as MwOsint on twitter and owner of the https://keyfindings.blog site. Matthias is in Germany where the default is to trust no one and privacy is the utmost concern. Matthias takes us through how he was able to combine social engineering and OSINT to find out if a given business address was legit, or something a little more shady. 
21:07
January 13, 2020
Episode 4: Steve Laura - A Full PSE Walkthrough
For this episode, we have Steve Laura, a social engineer and pentester for Blue Cross Blue Shield. On this longer episode, he takes through the recon, the initial access, his thought process along the way and how he dealt with employees on the lookout for a pentester trying to get into their building! You can find Steve on twitter at Steven1669.
47:25
January 6, 2020
Episode 3: Katelyn Bowden - Her First OSINT
For this episode, we have Katelyn Bowden, CEO of the BADASS Army, a non-profit organization dedicated to providing support to victims of revenge porn and image abuse. Katelyn tells us about her first experience with OSINT. A personal experience that involved some social engineering to drum up some small town drama and how a machine gun was the one piece of information that got Katelyn the goods. You can find Katelyn on twitter at BadassBowden.
10:23
December 31, 2019
Episode 2: Katelyn Bowden - Taking Down a Criminal
For this episode, we have Katelyn Bowden, CEO of the BADASS Army, a non-profit organization dedicated to providing support to victims of revenge porn and image abuse. Katelyn tells us about how her organization works and how her experience with a siren, and how one guy’s desire for Funko Pops ended up being his downfall in the world of trading nude images. You can find Katelyn on Twitter at BadassBowden.
11:22
December 31, 2019
Episode 1: Trevor O'Donnal - Rapport Building with Vishing
For our first episode, we have Trevor O’Donnal from Rapid7. Trevor tells us about a particularly difficult social engineering engagement where he needed to engage staff through phone calls. But it was a small company, everyone knows each other and sits near each other. Let’s hear Trevor tell us how he used good reconnaissance to build rapport and get people talking. You can find Trevor on Twitter at todonnal.
17:23
December 17, 2019