
Sign up to save your podcasts
Or


Reconnaissance in cyber security isn't just about scanning networks; it's about understanding your entire attack surface, including the human element. In this episode, Curtis and Prasanna analyze Mr. Robot season one, episode two, (AKA ep 1.1) to explore how sophisticated threat actors conduct reconnaissance before major attacks.
Learn how F Society mapped Evil Corp's infrastructure, identified backup locations like Steel Mountain, and used human intelligence to target vulnerable employees. We discuss the reality that attackers will spend months researching your organization, mapping your networks, and identifying weaknesses in both your technology and your people.
The hosts break down practical reconnaissance techniques, from social engineering tactics (like the CD attack on Angela and Ollie) to digital network mapping. You'll discover why backup systems are prime targets for reconnaissance and how proper network segregation can limit blast radius when - not if - you're compromised.
By W. Curtis Preston (Mr. Backup)4.7
2626 ratings
Reconnaissance in cyber security isn't just about scanning networks; it's about understanding your entire attack surface, including the human element. In this episode, Curtis and Prasanna analyze Mr. Robot season one, episode two, (AKA ep 1.1) to explore how sophisticated threat actors conduct reconnaissance before major attacks.
Learn how F Society mapped Evil Corp's infrastructure, identified backup locations like Steel Mountain, and used human intelligence to target vulnerable employees. We discuss the reality that attackers will spend months researching your organization, mapping your networks, and identifying weaknesses in both your technology and your people.
The hosts break down practical reconnaissance techniques, from social engineering tactics (like the CD attack on Angela and Ollie) to digital network mapping. You'll discover why backup systems are prime targets for reconnaissance and how proper network segregation can limit blast radius when - not if - you're compromised.

289 Listeners

2,010 Listeners

374 Listeners

653 Listeners

1,023 Listeners

6 Listeners

8,047 Listeners

181 Listeners

313 Listeners

189 Listeners

74 Listeners

138 Listeners

44 Listeners

168 Listeners

559 Listeners