NSA 'Red Team' Hacker | Jeff Man | Ep. 269

preview_player
Показать описание
Support the show here:⬇️

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Jeff Man is a respected Information Security expert, advisor, evangelist, and co-host on Paul’s Security Weekly and Tribe of Hackers. He is currently serving in a Consulting/Advisory role for Online Business Systems. Jeff had over 37 years of experience working in all aspects of computer, network, and information security, including cryptography, risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing. He is a certified NSA Cryptanalyst and he previously held security research, management and product development roles with the National Security Agency, the DoD and private-sector enterprises. He was also part of the first penetration testing “red team” at NSA. For the past 20 years, Jeff has been a pen tester, security architect, consultant, QSA, and PCI SME, providing consulting and advisory services to many of the nation’s best known companies.

------------------------------------------------------------------------------------------------------------------------------------------------

To help support the show and for all bonus content including:
-AD FREE AUDIO
-AD FREE VIDEO
-Access to ALL bonus segments with our guests
Subscribe to our Patreon! ⬇️

Or make a one time donation at: ⬇️

Team House merch: ⬇️

Social Media: ⬇️
The Team House Instagram:
The Team House Twitter:
Jack’s Instagram:
Jack’s Twitter:
Dave’s Twitter:

Team House Discord: ⬇️

SubReddit: ⬇️

Jack Murphy's memoir "Murphy's Law" can be found here:⬇️

The Team Room Reading Room (Amazon Affiliate links):⬇️

Want to sponsor the show?
Email: ⬇️

#nsa #cyberwarfare
Рекомендации по теме
Комментарии
Автор

I got interviewed by two NSA suits while I was in the military. I was the senior battle stations Missile Tech serving on the SSBN 630's gold crew. While doing some electeical diagnostics in a panel while out on partol I found that with just a few jumpers I could make it a very bad day for the navy. As in 110 lives lost and over a billion$ worth of scrap metal on the ocean floor.
So I notified my Weapon's officer, who verified my findings and then pulled me into a meet with my CO and XO. I was told to keep the info to myself, so I did.
The very first people across the gangplank after we got to port was two NSA suits to come meet with me.
For a guy in my position they knew about everything about me, including my school records, military evaluations and training and my memberships, and about the members of my family.
The meeting seemed surreal, but what it came down to was that if I had a grudge and were suicidal and wanted to end my boat and the guys I lived and worked with they would never have known until it was already done. So the fact that I was there talking to them should be proof enough that I wasn't a threat.
The next several days I met with three electical engineers from a Navy-contracted university to help re-design the lauch control systems. About 6 months later they nearly completely re-wired our boat's launcher control system.
Either the next patrol, or the patrol after that I found a way to bypass the Captain's permission to fire and the Weapons Officer's permission to fire the missiles. This was launch-only and they would basically be duds. But I was told to just stop it and keep that stuff to myself.
The Calhoun has since been scrapped out so none of this matters any more.

stevelux
Автор

Man i was super excited to listen to this! Grandpa didn't say a whole lot of his experience with No Such Agency. Great to hear Jeff's perspective

brock
Автор

We always hear stories about assaulters who look like average joes, I want to hear stories about absolutely yoked hackers. Where’s the “armed NFL Football team” of the electronic world?

FPIZZA
Автор

About a decade ago back when I was big into cracking password hashes I remember finding the hidden or obscure ASCII keys. Like you hold the Alt key and you hit on the number pad 168 and you release the Alt button and it's an upside down question mark. And it worked on password hashes that almost nobody was able to crack. Many ASCII obscure symbols can mask your hashes compared to everyone else's, at least for a while anyway.

johnjohnson
Автор

cold war accelerated hiring, but every time i listen to these nsa guys it's the same thing: "my dad worked on the manhattan project and/or hydrogen bomb". started to believe the recruiting process is just nepotism.

Sherloklol
Автор

1:10:46 2600 is still around! I saw it in barnes and nobles recently, no joke.

shibbidydoowop
Автор

Everyone pay attention to just how ORDINARY this man is. He's not some "super spy" as Hollywood portrays, just a guy who does math, doing a real job supporting the troops that keep us free. 💻

gregm
Автор

You guys should ask Deviant Ollam if he would come on, if you are interested in going down this Rabbit Hole. Hak5, would be a great resource too. Not everyone is necessarily going to want to come on. Kevin Mitnik would of been an uber guest (R.I.P.)

Len_M.
Автор

Patch Tuesday….followed by IT scramble Wednesday….😅

SigHellion
Автор

He's right about the book The Cuckoo's Egg. It's absolutely fantastic. I think I've read it three times over the years.

johnneiberger
Автор

Secure Telephone Unit, LOL. Good thing they didn't call it a Secure Telephone Device. I could just see operations people calling field agents and asking if they had received their STD.🤣

terry
Автор

There is/are no link(s) on the info page under the video to Jeff Man or the Security Weekly podcast that is mentioned ~ 2:32:45

derekl
Автор

Mr. Man, like all of your guests, was fantastic.

Jason-D
Автор

Really stelar interview, anyone who's been to defcon i always enjoy hearing their perspective and gaining insight into their world. Great conversation guys!

ArtofTechnologyPodcast
Автор

That attack I guess you could call an early day version of social engineering

InsertNameHere.
Автор

Omg my grandpa wore suits and went on out of town trips he was an engineer. Maybe he was nsa😂

AIMEE
Автор

Love podcasts like this😊. Thanks boys.

tehbarbour
Автор

Good discussion but I have to disagree somewhat with Jeff because there *WAS* a hacking community in early 2000's. Perhaps not as large and known to the general public as it maybe today but Bellcore had a unit (Security & Fraud Group) that actually worked with a few agencies at the time on telecom and cyber security and its members delivered briefings (TSARS, SecureComm) on Cyber and who also used to follow 2600 events in NYC (from early 90's)...in addition, members of the Bellcore group also helped capture LoD (Legion of Doom) members. And also one of the Bellcore members was mentioned in Cliff Stohls "cuckoo's egg" who had helped with the investigation.

pmthermos
Автор

Haha, does anyone ever REALLY leave the company?

noam
Автор

He's the evil in this lie being told. That means he is no real judge.

jamesjarvis-bxqi