157: Grifter
Digest
This podcast features Grifter, recounting his incredible journey from a mischievous youth with early involvement in hacking and criminal activities to a respected cybersecurity expert. He details his extensive involvement with Def Con, from attendee to key organizer, sharing humorous anecdotes and describing unique events like his identically-disguised party. Grifter discusses his risky Twitter takeover experiment, showcasing his trust in his fans. He also shares his experiences in the Air Force, explaining how military service transformed his career path. His story highlights the evolution of his hacking skills, from accidental credit card fraud to ethical threat hunting and his current role managing the Black Hat NOC. The podcast offers valuable insights into the cybersecurity world, emphasizing the importance of continuous learning and community involvement.
Outlines

Def Con Experiences and Career Evolution
Grifter recounts his incredible Def Con experiences, from attendee to key organizer, detailing the unique atmosphere, all-night parties, and his risky Twitter experiment. He also shares his journey from early hacking and criminal activities to his current role in cybersecurity, including his time in the Air Force and his work at Black Hat's NOC.

Grifter's Background and Ethical Transition
Grifter shares his childhood, early fascination with computers, and progression from mischievous youth to skilled hacker and cybersecurity expert, including his early hacking experiences, involvement with organized crime, and his decision to join the Air Force.

Black Hat NOC and Cybersecurity Expertise
Grifter details his long-standing involvement with Def Con, his role as a goon, and his current responsibilities managing the network operations center at Black Hat, highlighting the challenges and rewards of his work in cybersecurity.
Keywords
Def Con
Annual hacker conference in Las Vegas, known for its unique atmosphere, all-night parties, and focus on security vulnerabilities. A major event in the cybersecurity community.
Cybersecurity
The practice of protecting computer systems and networks from theft, damage, and unauthorized access. Includes various techniques and technologies to mitigate risks.
Hacker
An individual skilled in computer programming and networking, often used to describe those who exploit vulnerabilities in systems. Can be used ethically (white hat) or maliciously (black hat).
Black Hat
A cybersecurity conference focusing on advanced security research and techniques.
Threat Hunting
Proactive cybersecurity approach focusing on identifying and responding to advanced threats that have already bypassed traditional security measures.
Responsible Disclosure
Ethical practice of reporting security vulnerabilities to vendors privately, allowing them time to fix the issue before public disclosure.
Air Force
Grifter's military service significantly impacted his career path and ethical development.
Credit Card Fraud
Grifter's early involvement in illegal activities, highlighting his transition to ethical hacking.
Q&A
What is the most memorable experience you've had at Def Con?
The party I threw where everyone wore the same disguise as me, making me nearly impossible to find. It was a unique blend of success, anonymity, and social interaction.
How did your early experiences with computers and hacking shape your career in cybersecurity?
My early, often illegal, explorations forced me to learn troubleshooting and problem-solving skills, laying the foundation for my later expertise in identifying and mitigating security threats.
What are the biggest challenges you face running the Black Hat NOC?
The constant barrage of attacks from attendees testing vulnerabilities, the need to quickly patch newly discovered exploits, and dealing with compromised attendees.
What advice would you give to aspiring cybersecurity professionals?
Seek out communities like Def Con groups to learn from experienced professionals and network with like-minded individuals. Embrace continuous learning and problem-solving.
What's the most surprising thing you've discovered while threat hunting?
Discovering a six-month-long FTP data exfiltration operation at a major financial institution, completely undetected by their extensive security team. It highlighted the importance of looking beyond the expected.
Show Notes
Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days exploring networks to helping shape one of the largest hacker conferences in the world, Grifter has built a reputation for blending deep technical insight with a sharp sense of humor.
Learn more about Grifter by visiting grifter.org.
Sponsors
Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.
Support for this show comes from ZipRecruiter. ZipRecruiter has solved the hiring problem. Employers prefer it the most for so many reasons. Let’s start by telling you about their matching technology. They work hard to find the best candidates for your needs, and will instantly show you results once you post a job listing. ZipRecruiter will speed up your hiring process. See it for yourself at www.ziprecruiter.com/DARKNET.
This show is sponsored by Material Security. Your cloud office (think Google Workspace or Microsoft 365) is the core of your business, but it’s often protected by scattered tools and manual fixes. Material is a purpose-built detection and response platform that closes the gaps those point solutions leave behind. From email threats to misconfigurations and account takeovers, Material monitors everything and steps in with real-time fixes to keep your data flowing where it should. Learn more at https://material.security.























