From Black Hat to Bug Bounties [Pt. 2] with Thomas DeVoss

From Black Hat to Bug Bounties [Pt. 2] with Thomas DeVoss

We’re joined again by the hacker’s hacker, Tommy DeVoss, aka dawgyg. Bug bounty hunter and reformed black hat, Tommy dives back into a great conversation with us about his journey in hacking and his advice to future red team offensive hackers. We cover everything we couldn’t get to from part 1 of our interview, including his struggles with burnout, his past hacking foreign countries on a bold quest to stop terrorism, and his future in Twitch streaming to teach you how to be a better bug bounty hunter.

Timecoded Guide:

[02:57] Fixating on hacking because of the endless possibilities and iterations to learn

[09:54] Giving advice to the next generation of hackers

[17:17] Contacting Tommy and keeping up with him on Twitter

[21:43] Planning a Twitch course to teach hackers about bug bounties using real bugs and real-world examples

[24:57] Hacking in the early 2000s and understanding the freedom Tommy has to talk about any and all illegal hacking he’s done now that he’s gone to prison

Sponsor Links:

Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!

Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone

PlexTrac is pleased to offer an exclusivecRed Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!

Do you ever struggle with burnout when it comes to hacking?

Hacking has maintained Tommy’s interest longer than anything else because of the constant changes in technology and the ever-evolving issues in the online world. However, just because hacking is his passion, doesn’t mean that burnout or frustration never happens. Currently, Tommy is taking more of a break with hacking, letting his current day job and his passion for gaming have a front seat. However, he’s still firmly in the industry, passionately developing learning opportunities for future hackers and answering questions from cyber professionals of all backgrounds.

“I do get burned out sometimes…When it comes to bug bounty hunting, I try and make it so it averages out to where I make at least $1,000 an hour for my effort. It doesn't always work. Sometimes I'm more, sometimes I'm less, but I try and get it so it averages out to about that.”

What hacking advice would you give the younger version of yourself?

Although his black hat ways resulted in prison time for Tommy, he doesn’t regret his past and instead seeks to teach others the lessons he’s learned. When we asked Tommy for advice for new hackers, he was clear that success is a longer journey than people assume it is. Tommy’s success was not a fluke, it took years of hands-on learning and patience with failures in order to develop his bug bounty skills. Nothing is actually automatic or easy with hacking, especially as the technology continues to change and evolve. Tommy wants hackers to take every opportunity to try out their skills, even if it's a complete failure.

“Don't expect success overnight. Also, don't let failure discourage you. When it comes to hacking, you're going to fail significantly more than you're going to succeed. And the people that are successful in bug bounties are the ones that don't let those failures discourage them.”

What do you think about the “media obsessed” stereotype many people have about black hat hackers?

Wrapping up today, Tommy tells us that he’d be happy to be back in the Hacker Valley Studio again some time. Although the stereotype of a black hat hacker wanting attention from the media is disproven, Tommy believes that he definitely has craved that media attention for a large majority of his hacking career. Starting in the early 2000s, after 9/11, Tommy had one of his first brushes with fame in an interview with CNN about hacking Middle Eastern companies. Although his hacking and his politics have changed since then, Tommy enjoys having in-depth conversations about hacking and explaining the intricacies of what he does.

“We loved the attention back then, and I still love the attention now, it's nice. The good thing about now is, because I already got in trouble for everything that I've done, I've done my prison time, I don't have anything that I did illegally on the computer anymore that I can't talk about, because I've already paid my debt to society.”

What are the best ways for people to keep up with what you’re doing?

Considering Tommy’s success, it’s understandable that a lot of cyber professionals and amateurs have tons of questions for him. When it comes to getting in contact with Tommy, he recommends tweeting him on Twitter publicly so that he can not only answer your question, but help others with the exact same questions. Education is key, and Tommy is so dedicated to teaching other hackers that he’s currently developing a recurring Twitch stream centered around helping others learn about bug bounty hunting.

“I don't know how successful we're going to be in finding the bugs, but I think it'll be fun to teach people [on Twitch] and do it that way, so that they can actually spend some time learning it. The best way to actually learn this stuff is to actually try and do the hacking.”

-----------

Links:

Stay in touch with Thomas DeVoss on LinkedIn and Twitter.

Check out the Bug Bounty Hunter website.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Ron Eddings on Twitter and LinkedIn

Catch up with Chris Cochran on Twitter and LinkedIn

Purchase a HVS t-shirt at our shop

Continue the conversation by joining our Discord

Jaksot(408)

Episode 160 - Creating Valuable Tech Content with Ken Underhill

Episode 160 - Creating Valuable Tech Content with Ken Underhill

Ken Underhill is an award-winning cyber security executive, entrepreneur, and teacher. His mission is to help others find their value and share it; ultimately leading to success both professionally and personally. Ken’s courses offer an intuitive approach to help start a career in cyber security. Whether you’re a budding cyber security professional or a seasoned veteran, Ken’s perspective can serve a purpose in your life.  Join Ron, Chris and Ken to dive into what it takes to create content, help others, and thrive in your career!   01:30 Guest Intro 02:14 Bio  11:30 Ken’s journey in content creation 13:22 Why focusing on giving value first matters 16:15 Ken’s future plan for content 23:50 The path to making an impact 29:40 Connecting with your audience 37:58 Get in touch with Ken    Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Ken Underhill: Courses | YouTube | Website | LinkedIn  Support Hacker Valley Studio on Patreon. Join our monthly mastermind group via Patreon Visit our friends and sponsor Panther Labs

4 Elo 202139min

QuickQ: What is Threat Hunting?

QuickQ: What is Threat Hunting?

In this episode of Hacker Valley, Chris and Ron are joined by a familiar friend, Valentina Palacín, who you might have heard on HVS Blue season 1. Valentina is an author, public speaker, self-taught developer, and Threat Operations lead at Marqeta Incorporated, armed with a background in translation and interpretation.  Join Chris, Ron and Valentina for this round-table masterclass in all things Threat Hunting to discuss the questions you may be asking yourself: What is Threat Hunting? How do you become a Threat Hunter? What’s it like to be in the shoes of a Threat Hunter? Or work with one?    Key Takeaways:   0:00 Welcome to the podcast! 1:10 Introduction/ Bio 2:55 What is Threat Hunting? 5:25 Chris’ take on working with a Threat Hunter (Ron) 7:08 Valentina’s Threat Hunting flow 9:18 Ron and Valentina talk about progressions in Threat Intelligence 12:20 The group talks about the ideal characteristics of a Threat Hunter in both junior and senior level positions 18:00 How to get into Threat Hunting 20:55 Get in touch with Valentina!   Valentina Palacín: Book | LinkedIn | Twitter Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Support Hacker Valley Studio on Patreon. Join our monthly mastermind group via Patreon

30 Heinä 202122min

Episode 158 - Wild Adventures with Chef Bri Van Scotter

Episode 158 - Wild Adventures with Chef Bri Van Scotter

In this episode, Chris, Ron, and their special guest going to be talking about your table. Not the table itself, but what is on it. They are talking about food and following our passions. They've brought in Bri Van Scotter, professional Chef, author, hunter, and host of the TV series Wilderness to Table. Bri is so unbelievably talented in so many areas. Everyone is going to love this episode and learn a little bit about the food we eat.    Key Moments 00:56 - Intro to Bri 02:41 - Bri’s Background 03:59 - The darker side of food production 04:57 - The hunt begins 06:13 - For the love of food 11:41 - On going deep with your craft 16:10 - Getting more in touch with your food 21:33 -  Eating for Health 22:52 - Honoring our food sources 25:28 - Knowledge is power   Visit Bri at her website Follow Bri on Instagram Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram Join our monthly mastermind group via Patreon Visit our friends and sponsor Panther Labs

28 Heinä 202127min

QuickQ: What is Security Architecture?

QuickQ: What is Security Architecture?

Ron and Chris are the hosts and guests for this episode! This episode answers fundamental questions about Security Architecture. Learning about security architecture is absolutely essential for anyone on the path of becoming a cyber security expert just looking to learn more about a cybersecurity topic. Security Architecture is the foundation, the fabric and the process used to help secure your data, your privacy, and even your money. Now for a second, Imagine that you are an architect and your biggest strength is your ability to build banks. And a new client reaches out to you... We'll name this client Ray. And Ray asks you to build his company a new bank with all the bells and whistles. You're going to need to build Ray and his company something spectacular! This bank you build is going to need to serve as an office and boost productivity for the bank staff. The bank is also going to serve as a place where customers can deposit and withdraw money. But most importantly, Ray is going to want you to protect his crown jewel, his money! (Think of all those gold bricks and bars that Ray is going to want to keep under his possession )   Key Takeaways: 0:00 - Welcome back to the Hacker Valley Studio 1:10 - Ron's favorite topic! Security Architecture 1:45 - Security architecture is the foundation  2:21 - Where a security architecture starts and stops 4:00 - A security architect is playing a game of Tower Defense 6:27 - Using EASY Framework as a security architect 10:04 - Prerequisites for becoming a security architect 13:55 - Differences between security architect and security engineers 16:55 - Resources for learning more about security architecture 19:21 - Stay in touch with Hacker Valley Studio!   Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram Join our monthly mastermind group via Patreon Learn more about our fantastic sponsor Upytcs

22 Heinä 202120min

Episode 156 - Detection as Code with Nick Hakmiller

Episode 156 - Detection as Code with Nick Hakmiller

In this episode, we speak to a Detection and Response expert! Our guest is Nick Hakmiller, Senior Engineering Manager at Panther Labs. Nick was first exposed to technology in High School where he took an introduction to Visual Basic programming course. When learning about multi-threaded applications Nick became curious and began exploring how to open too many threads to crash a computer. Throughout Nick’s career he’s maintained an interest and focus on attack techniques and building defensive security programs. On occasions, security controls may fail to catch an attacker. A detection is logic that is applied to logs, security controls, and alerts to notify teams and automated processes. Nick describes Python as an exceptional programming language to apply detections and create detections as code. Nick describes many aspects of security as an engineering problem. As organizations transform and adopt new technologies, security issues arise and evolve. Nick describes that the team’s that are most successful with applying detection as code have chosen to view security as a function that engineering should participate in and help solve. As an organization’s security program matures, Nick mentions that the most impactful detections will likely be written and created by someone within the organization. For instance, creating a detection that defines which users should have access to sensitive data is likely to be created by a member of the organization with knowledge of team structure. Towards the end of the episode, Nick shares his wisdom to any practitioner that wants to step into the role of creating detections and providing impact while doing so.   Key Takeaways 0:00 - Welcome Back to the Hacker Valley Studio Podcast! 2:29 - Nick Hakmiller, Senior Engineering Manager at Panther Labs 4:20 - How Nick became interested in technology 6:00 - What is a detection? 7:25 - How detection as code applies to cybersecurity and software engineering 10:11 - Prerequisites to consider before applying detection as code 12:27 - Thinking beyond out of the box solutions and applying detections 15:54 - Categories of detections and which are most impactful 23:45 - Reducing alerts by engineering efforts 27:40 - Is it possible to automate everything for security? 32:56 - Advice on getting started with creating detections   Keep in touch with Nick Hakmiller on LinkedIn Reach out to Nick on Panther’s Community Slack Stay up to date with Nick’s work by viewing Panther Analysis Learn more about Panther Labs

20 Heinä 202138min

QuickQ: What is Threat Intelligence?

QuickQ: What is Threat Intelligence?

Today’s guests are our very own hosts!  Ron and Chris.  Together they tackle everything that surrounds threat intelligence by answering both the hard and easy questions. Between the stories they share about past experiences, and the facts behind threat intelligence, you will learn something new, and that’s a promise! In essence, threat intelligence is taking the information about threats or things that can go wrong and applying it to their network and company.  It’s the processing, collection and analyzation of data to understand threat actors, motives, targets and attack behaviors.    Key Takeaways   1:10 Episode starts 2:39 Threat intelligence 3:00 Ron & Chris share what threat intelligence means to them 6:33 Organizations and threat intelligence 8:39 Back in the day 12:54 Benefits of threat intelligence 15:08 Skills needed to be in threat intelligence 19:22 Networking 23:34 E.A.S.Y.   Links: Email Ron & Chris Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter. Follow hosts Ron Eddings and Chris Cochran on Twitter. Hacker Valley Merch!

15 Heinä 202126min

Episode 154 - Equity in Technology with Olivia Herriford

Episode 154 - Equity in Technology with Olivia Herriford

Today in the studio, we have Olivia Herriford, whose great and exceptional work is focused on equity in technology.  Olivia is the Regional Director and Employer Engagement at Bay Area Community College Consortium.   Olivia’s background is in technology, and with the Bay Area Community College Consortium, they support 28 community colleges in the San Francisco Bay region.  She often tells people she has what one would call an “ancient” computer science degree which she earned in 1973.  Olivia takes us back to what it was like to be a black woman in the mid-70s working with hardware and software engineers in the area of hardware design.  Sadly, she experienced a rather hostile work environment.   In today’s world, Olivia believes one of the best things we can do for reaching out to younger people is instill confidence.  These young people do not need to be swayed by comparing themselves to others, but rather realize we all bring something unique to the table.  Everyone needs to understand their own capabilities and power.   Key Takeaways: 2:26 Olivia’s background 6:38 How Olivia ended up where she is 15:45 How do we change the environment 17:17 Progress & future 20:42 Making an impact 23:04 Cultivating conversations 26:22 Equity in technology 29:08 Advice for awareness 32:35 Connecting with Olivia   Links: Olivia on LinkedIn Olivia on YouTube Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter. Follow hosts Ron Eddings and Chris Cochran on Twitter. Sponsored by Panther Labs

13 Heinä 202133min

Episode 153 - Your Personal Brand in Demand with Stephen Hart

Episode 153 - Your Personal Brand in Demand with Stephen Hart

Welcome back to the Hacker Valley Studio podcast. I'm sure you've heard of the term personal brand, and maybe you've asked yourself, what does it mean and how do I promote it. In this episode, we speak to someone that helps others develop their personal brand. We speak to Stephen Hart, entrepreneur, marketer, and brand strategist. We've known Stephen since way back. He's been a huge supporter, and someone that's helped develop our podcast and our branding. And this episode is nothing but pure gold and entertainment. Can't wait for everyone to listen. Let's jump right into it.  Our guest this episode is Stephen Hart. Stephen is the founder of Isles Media LLC, creator of Brand in Demand, and podcast host of Trailblazers.fm. podcast. Stephen always starts conversations off from a place of gratitude. He is grateful for his daughters, who have given him a “home base to run everything through. Beyond that, his is a Marketer and a podcast host for the last five, five and a half years. He is a brand strategist and the creator of an amazing program that he will talk about in a bit here. Listen in as Stephen gives some great tips, and a special invitation.   00:59 Welcome and Intro to Steven Hart 2:16 Steven shares his background 3:45 Become a brand in demand 6:06 Creating a digital footprint 8:15 Desire to start a podcast 9:08 Share others success through Trailblazers.fm 10:00 Creating a course for others 11:23 Brand Management 13:05 Business Digital Footprint vs. Personal footprint 14:39 Brand does not equal logo 16:55 Recreating himself 18:26 Getting clear on goals 19:55 Lacking clarity & how to get clear 24:00 Foundation to your vision 27:10 Entrepreneurship can live simultaneously with employment 30:46 Investment vs. spending 32:45 Getting started on your own vision 35:00 Who do you want to serve? 37:47 Discount for Hacker Valley Tribe   Stephen Hart on LinkedIn Stephen Hart on Twitter Stephen Hart on Instagram Visit Stephen on his website, stephenahart.com Join Brand in Demand, brandindemand.co Coupon code: hackervalley200 Hacker Valley website, hackervalley.com Hacker Valley Studio on LinkedIn Hacker Valley Studio on Twitter Hacker Valley Studio on Instagram Sponsored by AttackIQ

6 Heinä 202140min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
voi-hyvin-meditaatiot-2
psykopodiaa-podcast
psykologia
rss-duodecim-lehti
adhd-podi
rss-valo-minussa-2
rss-niinku-asia-on
rss-vapaudu-voimaasi
kesken
jari-sarasvuo-podcast
rss-ai-mita-siskopodcast
rss-luonnollinen-synnytys-podcast
rss-narsisti
rss-arkea-ja-aurinkoa-podcast-espanjasta
rahapuhetta
aamukahvilla
rss-uskonto-on-tylsaa
rss-koira-haudattuna
rss-rouva-keto