157: Grifter

157: Grifter

Update: 2025-04-0119
Share

Digest

This podcast features Grifter, recounting his incredible journey from a mischievous youth with early involvement in hacking and criminal activities to a respected cybersecurity expert. He details his extensive involvement with Def Con, from attendee to key organizer, sharing humorous anecdotes and describing unique events like his identically-disguised party. Grifter discusses his risky Twitter takeover experiment, showcasing his trust in his fans. He also shares his experiences in the Air Force, explaining how military service transformed his career path. His story highlights the evolution of his hacking skills, from accidental credit card fraud to ethical threat hunting and his current role managing the Black Hat NOC. The podcast offers valuable insights into the cybersecurity world, emphasizing the importance of continuous learning and community involvement.

Outlines

00:00:00
Def Con Experiences and Career Evolution

Grifter recounts his incredible Def Con experiences, from attendee to key organizer, detailing the unique atmosphere, all-night parties, and his risky Twitter experiment. He also shares his journey from early hacking and criminal activities to his current role in cybersecurity, including his time in the Air Force and his work at Black Hat's NOC.

00:11:27
Grifter's Background and Ethical Transition

Grifter shares his childhood, early fascination with computers, and progression from mischievous youth to skilled hacker and cybersecurity expert, including his early hacking experiences, involvement with organized crime, and his decision to join the Air Force.

00:34:13
Black Hat NOC and Cybersecurity Expertise

Grifter details his long-standing involvement with Def Con, his role as a goon, and his current responsibilities managing the network operations center at Black Hat, highlighting the challenges and rewards of his work in cybersecurity.

Keywords

Def Con


Annual hacker conference in Las Vegas, known for its unique atmosphere, all-night parties, and focus on security vulnerabilities. A major event in the cybersecurity community.

Cybersecurity


The practice of protecting computer systems and networks from theft, damage, and unauthorized access. Includes various techniques and technologies to mitigate risks.

Hacker


An individual skilled in computer programming and networking, often used to describe those who exploit vulnerabilities in systems. Can be used ethically (white hat) or maliciously (black hat).

Black Hat


A cybersecurity conference focusing on advanced security research and techniques.

Threat Hunting


Proactive cybersecurity approach focusing on identifying and responding to advanced threats that have already bypassed traditional security measures.

Responsible Disclosure


Ethical practice of reporting security vulnerabilities to vendors privately, allowing them time to fix the issue before public disclosure.

Air Force


Grifter's military service significantly impacted his career path and ethical development.

Credit Card Fraud


Grifter's early involvement in illegal activities, highlighting his transition to ethical hacking.

Q&A

  • What is the most memorable experience you've had at Def Con?

    The party I threw where everyone wore the same disguise as me, making me nearly impossible to find. It was a unique blend of success, anonymity, and social interaction.

  • How did your early experiences with computers and hacking shape your career in cybersecurity?

    My early, often illegal, explorations forced me to learn troubleshooting and problem-solving skills, laying the foundation for my later expertise in identifying and mitigating security threats.

  • What are the biggest challenges you face running the Black Hat NOC?

    The constant barrage of attacks from attendees testing vulnerabilities, the need to quickly patch newly discovered exploits, and dealing with compromised attendees.

  • What advice would you give to aspiring cybersecurity professionals?

    Seek out communities like Def Con groups to learn from experienced professionals and network with like-minded individuals. Embrace continuous learning and problem-solving.

  • What's the most surprising thing you've discovered while threat hunting?

    Discovering a six-month-long FTP data exfiltration operation at a major financial institution, completely undetected by their extensive security team. It highlighted the importance of looking beyond the expected.

Show Notes

Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days exploring networks to helping shape one of the largest hacker conferences in the world, Grifter has built a reputation for blending deep technical insight with a sharp sense of humor.

Learn more about Grifter by visiting grifter.org.

Sponsors

Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let’s start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.

This show is sponsored by Material Security. Your cloud office (think Google Workspace or Microsoft 365) is the core of your business, but it’s often protected by scattered tools and manual fixes. Material is a purpose-built detection and response platform that closes the gaps those point solutions leave behind. From email threats to misconfigurations and account takeovers, Material monitors everything and steps in with real-time fixes to keep your data flowing where it should. Learn more at https://material.security.

Comments 
loading
In Channel
172: SuperBox

172: SuperBox

2026-04-0701:31:04

171: Melody Fraud

171: Melody Fraud

2026-03-0301:13:01

170: Phrack

170: Phrack

2026-02-0347:55

169: MoD

169: MoD

2026-01-2001:09:36

168: LoD

168: LoD

2026-01-0601:20:58

167: Threatlocker

167: Threatlocker

2025-12-2349:17

166: Maxie

166: Maxie

2025-12-0201:04:54

165: Tanya

165: Tanya

2025-11-0451:36

164: Oak Cliff Swipers

164: Oak Cliff Swipers

2025-10-0701:31:28

163: Ola

163: Ola

2025-09-0201:26:16

162: Hieu

162: Hieu

2025-08-0501:37:08

161: mg

161: mg

2025-07-1501:15:22

160: Greg

160: Greg

2025-07-0101:41:08

159: Vastaamo

159: Vastaamo

2025-06-0354:05

158: MalwareTech

158: MalwareTech

2025-05-0601:10:35

157: Grifter

157: Grifter

2025-04-0101:21:36

156: Kill List

156: Kill List

2025-03-1801:06:41

155: Kingpin

155: Kingpin

2025-03-0401:12:03

154: Hijacked Line

154: Hijacked Line

2025-02-0401:09:58

153: Bike Index

153: Bike Index

2025-01-0701:07:56

loading

Table of contents

00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

157: Grifter

157: Grifter

Jack Rhysider