8th Layer Insights cover image

Open Source Intelligence (OSINT): The Data We Leak

8th Layer Insights

00:00

How Does DEF CON Differentiate From a Real Attack?

Contestants spend between 40 and 120 hours on research on these targets. They are not allowed to contact the company at that stage. At DEF CON, they have 25 minutes live in front of an audience to call the company. And they have to extract similar objectives over the phone.

Play episode from 22:09
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app