SIM Swapping: How Worrying is it in 2024?

Summary:

Episode Summary: In this exchanged episode, Timothy De Block chats with Mubix about the intricacies of SIM swapping, an attack vector that has seen significant attention. They discuss the current state of SIM swapping, how attackers exploit this technique, and the measures carriers have implemented to mitigate these risks. Mubix highlights the importance of understanding your risk profile and the practical steps organizations and individuals can take to protect themselves.

Key Topics:

  • The evolution and difficulty of executing SIM swapping attacks.

  • Real-world examples and the misclassification of SIM swapping incidents.

  • The impact of enhanced carrier protections and the role of user awareness.

  • The distinction between SIM swapping and other forms of social engineering.

  • Practical advice for businesses and high-risk individuals to safeguard against SIM swapping.

Discussion Points:

  • SIM swapping detection and reporting procedures.

  • The role of eSIMs and potential security concerns.

  • The importance of proactive security measures and user empowerment.

Contact Information:

Leave a comment below or reach out via the contact form on the site, email timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.

Check out our services page and reach out if you see any services that fit your needs.

Social Media Links:

[RSS Feed] [iTunes] [LinkedIn]


What is Mimikatz?

Summary:

Rob Fuller aka Mubix joins me to discuss what is Mimikatz? This came from some research I was doing online about hacker tools. I went to the Mimikatz GitHub repo and was immediately hit with a warning that it was a malicious site. Then I looked at the GitHub page and noticed it hadn’t been updated in years.

This lead me to reach out to Hacker Historian Mubix to get the skinny on Mimikatz. He provided some interesting not well known insights that you’ll have to listen to the episode to hear.

Episode Highlights:

  • Why Mimikatz is still around

  • What is Mimikatz?

  • How is it used?

  • How to detect Mimikatz

Guest Information:

Rob Fuller aka Mubix

Resources and Mentions:

Contact Information:

Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.

Check out our services page and reach out if you see any services that fit your needs.

Social Media Links:

[RSS Feed] [iTunes] [LinkedIn]