meta_pixel
Tapesearch Logo
Log in
Darknet Diaries

Ep 20: mobman

Darknet Diaries

Jack Rhysider

True Crime, Technology

4.98.6K Ratings

🗓️ 15 August 2018

⏱️ 49 minutes

🧾️ Download transcript

Summary

Chances are, if you were downloading shady programs in the early 2000's, you were infected with malware he wrote called SubSeven. Hacking changed mobman's life. Hear how it happened by listening to this episode. Image for this episode created by dr4w1ngluc4s. Check out his Instagram to see some amazing artwork! Check out the podcasts Van Sounds and True Crime Island Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

Computers aren't always right. They make mistakes, encounter errors, and crash. Sometimes the

0:06.0

errors can be frustrating. Especially when the computer is at a big company, and it

0:10.6

makes a billing error that says you owe them $1000. When that corporation won't admit

0:15.9

it's their mistake and insists you pay for the bill that you didn't create, this can

0:20.6

be infuriating. But what can you do when you try to fight it, but the corporation refuses

0:25.5

to admit it's their problem? Well, some hackers know exactly what to do.

0:35.0

These are true stories from the dark side of the internet.

0:41.0

I'm Jack ReCiter. This is Darknet Diaries.

0:55.5

This episode is supported by XM Cyber. Each month organizations have thousands of

1:07.5

exploitable security exposures like vulnerabilities, weak passwords, overly permissive identities,

1:13.3

and misconfigurations in their infrastructure and active directory. But most organizations

1:17.8

only address a small percentage of these issues. XM Cyber eliminates multiple exposures

1:23.0

in one fix for ultra-efficient risk remediation. With the XM Cyber Continuous Exposure Management

1:29.0

Platform, teams can see how exposures combine, enabling attacks to reach critical assets,

1:34.6

and then pinpoint where to disrupt those attack paths to rapidly reduce risks across the

1:39.0

organization. Stop dealing with endless lists of exposures. Instead, fix the issues that

1:44.1

actually put your business at risk. Head over to xmcyber.com to start remediating cyber

1:50.0

exposures more efficiently. That's xmcyber spelled xmcybbr.com.

2:20.0

I was addicted to video games. I'd sneak out in the middle of the night and go play it.

2:32.4

My mom would catch him doing this and take his Nintendo away. Little mom was addicted.

2:39.9

I'll go find it and skip school. I was like the devil. Eventually she could

2:49.9

take a hammer and smash the shit out of the Nintendo. That was my first computer. I got

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Jack Rhysider, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Jack Rhysider and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.