meta_pixel
Tapesearch Logo
Log in
Darknet Diaries

69: Human Hacker

Darknet Diaries

Jack Rhysider

True Crime, Technology

4.98.6K Ratings

🗓️ 7 July 2020

⏱️ 68 minutes

🧾️ Download transcript

Summary

We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, security consultant and master social engineer, Christopher Hadnagy, joins us to share his stories and wisdom. He describes what it was like to be a social engineer before the world knew what social engineering was and tells some of his amazing stories from his long career in penetration testing. A big thanks to Christopher Hadnagy from social-engineer.org for sharing his stories with us. Check out his book Social Engineering: The Science of Human Hacking, affiliate link here. Check out his podcast called The Social-Engineer podcast. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial. Sources https://www.social-engineer.org/ How phishing scammers manipulate your amygdala and oxytocin TEDxFultonStreet DEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SE https://en.wikipedia.org/wiki/George_C._Parker Book Recommendations with affiliate links: Social Engineering Influence What Every Body is Saying Emotions Revealed Presence It’s Not About “Me”, Top 10 Techniques for Building Rapport Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

Before we really had the term social engineer, people used to just say con artist.

0:06.0

Because what a con game is, is where you gain someone's trust and then defraud them.

0:11.0

Social engineers gain people's trust in order to trick them.

0:15.0

Same thing.

0:16.0

And one of my favorite con artists was George C. Parker.

0:19.0

He made a living off of selling things he didn't own.

0:22.0

He lived in New York City in the early 1900s.

0:24.0

A lot of immigrants were moving into the city and he wanted to take advantage of their lack of knowledge

0:29.0

about the city.

0:30.0

Grant's tomb was built in 1897, which is the final resting place for Elysses S. Grant.

0:36.0

It's right in Manhattan and it's an extraordinary monument.

0:39.0

You can even go inside and look at the casket.

0:42.0

It's a popular tourist attraction.

0:44.0

George C. Parker saw so many people coming to see Grant's tomb.

0:48.0

He wanted to somehow make money off this.

0:50.0

And not by selling popcorn or hot dogs or flowers.

0:54.0

No.

0:55.0

No.

0:56.0

George's idea was to sell Grant's tomb itself, even though he didn't own it.

1:02.0

He got to work drafting up fake documents, which showed he was the grandson of Elysses S. Grant.

1:08.0

And then he rented an office to look like a legal place where you can make such a transaction.

1:12.0

And then he went around town looking for victims.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Jack Rhysider, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Jack Rhysider and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.