Darknet Diaries
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Technology
Personal Journals
Society & Culture
144: Rachel
Rachel Tobac is a social engineer. In this episode w...
more
Apr 2 2024 1h 4m
Chapter 1 4 mins
Stock Market Scammer's Math TrickChapter 2 12 mins
Data Security Automation and Social EngineeringChapter 3 6 mins
Security Company Uses Social EngineeringChapter 4 9 mins
Social Engineering in Penetration TestingChapter 5 12 mins
Social Engineering Tactics in Corporate EspionageChapter 6 6 mins
Ethical Hacker Tricks 60 Minutes HostChapter 7 10 mins
Voice Cloning and Spoofing ConversationChapter 8 2 mins
Security in a Cryptographic Future
143: Jim Hates Scams
Jim Browning has dedicated himself to combatting sca...
more
Mar 5 2024 1h 8m
Chapter 1 11 mins
Scam Baiting With Jim BrowningChapter 2 6 mins
Scammers' Tactics and Payment MethodsChapter 3 6 mins
Evolution of Scams and Refund FraudsChapter 4 5 mins
Confronting Scammers With Calm HackingChapter 5 4 mins
Hacking ScammersChapter 6 8 mins
Scammer Call Center Chaos and ExposedChapter 7 5 mins
Ethical Justification for Hacking ScammersChapter 8 8 mins
Inside a Scam Call CenterChapter 9 10 mins
Indian Police Inaction on Scam CentersChapter 10 1 min
Dreams of Visiting India
142: Axact
Axact sells fake diplomas and degrees. What could go...
more
Feb 6 2024 54m
Chapter 1 14 mins
The TV Mix-Up and Forbidden InterviewChapter 2 14 mins
Scamming Students and Misusing Personal InformationChapter 3 10 mins
Fake Degrees and Money Mules ScammingChapter 4 7 mins
The Scandal of Fake Degree WebsitesChapter 5 8 mins
Investigation and Convictions of Axxact ScamChapter 6 2 mins
Analyzing the Current Status of Exact
141: The Pig Butcher
The #1 crime which results in the biggest financial ...
more
Jan 2 2024 1h 1m
Chapter 1 6 mins
Escrow and Romance ScamsChapter 2 10 mins
Pig Butchering ScamChapter 3 4 mins
Romance Scams and Financial DevastationChapter 4 5 mins
Cyber FraudChapter 5 4 mins
Online Relationship Communication and Red FlagsChapter 6 14 mins
Business Email Compromise and Its EvolutionChapter 7 15 mins
NBM and Black ActsChapter 8 30 sec
Stories of Intelligence for Good
139: D3f4ult
This is the story of D3f4ult (twitter.com/_d3f4ult) ...
more
Nov 7 2023 1h 20m
Chapter 1 15 mins
Dark Side of Internet and HackingChapter 2 17 mins
Hacking for Justice and EmpowermentChapter 3 7 mins
Hacking for JusticeChapter 4 9 mins
High School Student Hacks CIA DirectorChapter 5 12 mins
Cybersecurity Breaches and Hacking ActivitiesChapter 6 14 mins
Discussion on Hacking and FBI RaidChapter 7 5 mins
Protecting Private Data and Identity SecurityChapter 8 41 sec
Dark Net Diaries Promotion and Community
138: The Mimics of Punjab
This episode is about scammers in the Punjab region....
more
Oct 3 2023 46m
Chapter 1 6 mins
Kite Fighting in IndiaChapter 2 13 mins
Darknet Exposure and Phone Scam WarningChapter 3 3 mins
Scammers Target Elderly With AIChapter 4 7 mins
Scammers Exploiting Language and Family ConnectionsChapter 5 9 mins
The Need to Protect Digital PrivacyChapter 6 6 mins
Taking Control of Your Digital PrivacyChapter 7 1 min
Disappearing & Digital Privacy
137: Predator
A new type of mercenary spyware came on the radar ca...
more
Sep 5 2023 1h 9m
Chapter 1 6 mins
Weapon Proliferation and Sam Cummings' BusinessChapter 2 14 mins
Israeli Cyber Surveillance Expands to GreeceChapter 3 6 mins
The NSO Group's Mobile Spyware OperationChapter 4 9 mins
Government Surveillance With Predator SpywareChapter 5 8 mins
Greek Government and Surveillance Technology ConferenceChapter 6 5 mins
Investigation Into Surveillance Tech SalesChapter 7 13 mins
The Ethics of Mercenary SpywareChapter 8 4 mins
Concerns Over Surveillance and Spyware AbuseChapter 9 1 min
Thank You for Guests and Support
135: The D.R. Incident
Omar Avilez worked in the CSIRT of the Dominican Rep...
more
Jul 4 2023 44m
Chapter 1 5 mins
Recurring Dream and Dark Internet StoriesChapter 2 12 mins
Ransomware Attacks in Costa Rica and Dominican RepublicChapter 3 7 mins
Government Agencies Under AttackChapter 4 7 mins
Importance of Cybersecurity and CollaborationChapter 5 10 mins
Geopolitical Cyber Attack and AttributionChapter 6 1 min
The Vulnerability of Digital Systems
134: Deviant
Deviant Ollam is a physical penetration specialist. ...
more
Jun 6 2023 1h 28m
Chapter 1 6 mins
Diamond Heist and Physical PenetrationChapter 2 4 mins
Lockpicking to Security ConsultingChapter 3 10 mins
Exploring Physical Security MeasuresChapter 4 10 mins
Breaking Into a BuildingChapter 5 7 mins
Corporate Security Testing and Social EngineeringChapter 6 9 mins
Penetration Testing in a Small TownChapter 7 7 mins
Penetration Testing and Catching the CulpritsChapter 8 9 mins
A Large-Scale Recon and Planning OperationChapter 9 12 mins
Infiltrating a High Security CompoundChapter 10 8 mins
Testing Security MeasuresChapter 11 2 mins
Defeating Security and Overcoming Fear
133: I'm the Real Connor
One day Connor Tumbleson got an email saying his ide...
more
May 2 2023 41m
Chapter 1 5 mins
Botched Job Interview Ethics TestChapter 2 7 mins
Tech Industry Identity Theft & ScamsChapter 3 8 mins
Interview Impersonation and Ethical DilemmasChapter 4 8 mins
Identity Impersonation on Upwork and BeyondChapter 5 6 mins
Fake LinkedIn Profiles and Upwork ScamsChapter 6 4 mins
Remote Work and Identity TheftChapter 7 1 min
Beware of Work From Home Scams
132: Sam the Vendor
Sam Bent, a.k.a. DoingFedTime, brings us a story of ...
more
Apr 4 2023 1h 19m
Chapter 1 13 mins
Navigating a Life ChangeChapter 2 8 mins
Darknet Market VendorChapter 3 13 mins
Making a Package Safe to ShipChapter 4 10 mins
Creating a Moral CodeChapter 5 5 mins
Dangers in Dark NetChapter 6 10 mins
The Consequences of Dark Net TradingChapter 7 11 mins
The Consequences of Security BreachesChapter 8 3 mins
Pros & Cons of ProfferChapter 9 3 mins
Sam's Legal Gamble
Presenting: Spycast "Black Ops: The Life of a Legendary CIA Shadow Warrior"
Jack is currently on a break. Here is a an episode f...
more
Feb 14 2023 1h 4m
Chapter 1 13 mins
Mental Health BreaksChapter 2 13 mins
The Contrast of the Southeastern RevolutionChapter 3 12 mins
Fighting Communism to TerrorismChapter 4 12 mins
Chasing the Pointing of the SpearChapter 5 11 mins
CIA Warriors' Courage
131: Welcome to Video
Andy Greenberg (https://twitter.com/a_greenberg) bri...
more
Dec 27 2022 1h 10m
Chapter 1 11 mins
Bitcoin and Child Abuse RingChapter 2 11 mins
The Dark WebChapter 3 15 mins
IRS Takes Down Welcome to Video SiteChapter 4 9 mins
Blockchain to Trace and Catch Child PredatorsChapter 5 9 mins
IRS Criminal Investigators Take Down Video Site AdminChapter 6 13 mins
The Welcome to Video Dark Web SiteChapter 7 46 sec
The Importance of Mental Health Breaks
130: Jason's Pen Test
Join us as we sit down with Jason Haddix (https://tw...
more
Dec 13 2022 45m
Chapter 1 10 mins
The Dark Side of the InternetChapter 2 7 mins
How to Hack a BankChapter 3 11 mins
Information Security Enables BusinessChapter 4 5 mins
Hacking a Pornography SiteChapter 5 7 mins
Pen Test on Porn Site Saved LivesChapter 6 2 mins
Penetration Testing and Security Testing
129: Gollumfun (Part 2)
Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun)...
more
Nov 29 2022 1h 20m
Chapter 1 12 mins
The Dangers of eBay ScamsChapter 2 12 mins
Brett Johnson's StoryChapter 3 7 mins
Brett's Descent Into CybercrimeChapter 4 3 mins
The Reality of Being a SnitchChapter 5 8 mins
Criminal Forum Monitored by BrettChapter 6 9 mins
Brett Johnson on the RunChapter 7 12 mins
Brett Johnson's Life of CrimeChapter 8 12 mins
A Man's Life of Crime Leads to PrisonChapter 9 3 mins
The Life-Changing Power of Second Chances
128: Gollumfun (Part 1)
Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun)...
more
Nov 15 2022 1h 3m
Chapter 1 5 mins
Brett Johnson's Life of CrimeChapter 2 8 mins
Brett's Life of Crime BeginsChapter 3 7 mins
Brett's Journey to Becoming a Successful ActorChapter 4 6 mins
Brett Johnson's Life of CrimeChapter 5 11 mins
Evolution of an Online CriminalChapter 6 7 mins
The Rise of Credit Card FraudChapter 7 13 mins
Shadow CrewChapter 8 1 min
Brett Johnson's Scams
127: Maddie
Maddie Stone is a security researcher for Google’s P...
more
Nov 1 2022 56m
Chapter 1 6 mins
The History of Software EngineeringChapter 2 11 mins
Dangers of Android MalwareChapter 3 14 mins
The Impact of Zero Day VulnerabilitiesChapter 4 9 mins
Dangers of Cyber AttacksChapter 5 8 mins
Vulnerability ResearchChapter 6 5 mins
Public Versus Private Research
126: REvil
REvil is the name of a ransomware service as well as...
more
Oct 18 2022 1h 6m
Chapter 1 7 mins
The Scam of the CenturyChapter 2 11 mins
The Evolution of RansomwareChapter 3 10 mins
Ransomware as a ServiceChapter 4 10 mins
The Evolution of RansomwareChapter 5 16 mins
The Aftermath of a Ransomware AttackChapter 6 8 mins
Arrest of the REvil Cyber GangChapter 7 1 min
The Evolution of Ransomware Gangs
125: Jeremiah
Jeremiah Roe is a seasoned penetration tester. In th...
more
Oct 4 2022 51m
Chapter 1 8 mins
Man Who Snuck Into Buckingham PalaceChapter 2 15 mins
AxoniusChapter 3 6 mins
Cenac Red TeamChapter 4 11 mins
Gain Access to a Building and Network Without AuthorizationChapter 5 8 mins
Conducting a Physical Penetration TestChapter 6 49 sec
The DreamWeaver, Jockey Cider, and the Acrobat
124: Synthetic Remittance
What do you get when you combine social engineering,...
more
Sep 20 2022 20m