Adventures of Alice & Bob

Merchants Media
undefined
Sep 26, 2025 • 56min

Ep. 88 - Microsoft Tried to Get Me Fired Weekly // HD Moore

James sits down with cybersecurity pioneer HD Moore, the legendary founder of the Metasploit framework, whose journey from dumpster-diving teenager to cybersecurity pioneer was anything but easy.   HD recounts how Microsoft called his employer weekly trying to get him fired for releasing exploits — harassment that ultimately motivated him to "drop zero days continuously, forever, until it got normal." He shares tales of accidentally controlling satellite systems after following network hops too far, backdooring 7,000 systems through tainted warez, and spending $80,000 on his personal credit card to build the Rapid7 team when traditional corporate processes moved too slowly. From crawling through school windows at 5 AM to access Apple computers as a poor kid, to discovering that Palo Alto devices were leaking 5,000 customers' domain admin passwords to internet scanners, HD's stories illuminate the wild early days when vulnerability research was considered criminal activity rather than corporate necessity. Discover how he accidently destroyed his first self-built computer, why his ex-wife held a pile of cash as bail money ready during years of FBI visits, and how the Phrack IRC channel became an unlikely recruitment ground for his first cybersecurity job.
undefined
Sep 22, 2025 • 56min

Ep. 87 - Code Crashes and Vinyl Scratches // Kevin Greene

In this episode, James Maude sits down with Kevin E. Green, Chief Security Strategist at BeyondTrust, whose 25+ year career stretches from configuring Nokia firewalls in basements to shaping federal research initiatives. Kevin recalls how crashing systems during penetration tests at Ernst & Young was once considered a win - a “capture the flag” moment - and how he crossed paths with future industry leaders like Stuart McClure and George Kurtz, who went on to found Cylance. He shares his pivotal work in mapping NIST 800-53 controls to the MITRE ATT&CK framework, transforming static security catalogs into threat-informed heat maps that show which defenses light up against real-world attacks. Blending technical depth with cultural insight, Kevin also draws unexpected parallels between cybersecurity and hip-hop — from how attacker techniques echo rapper “signatures” to why his alter ego "Kevtorious" and his "Secure Coding by Nature" brand reflect the creativity and pattern recognition needed in both fields.
undefined
Aug 29, 2025 • 55min

Ep. 86 - When Your VPC Partner Gets Pwned // Brian Wagner

In this episode, James Maude sits down with Brian Wagner, CTO at Revenir, whose cybersecurity story started at just 15, building Microsoft Access databases for a medical hospice. From teenage entrepreneur to AWS security specialist, Brian’s path has been anything but ordinary. He pulls back the curtain on his time with the elite Zipline incident response team where he confronted a catastrophic VPC peering breach that spiraled into data theft and blackmail. Together, James and Brian dissect how vendor network compromises can silently open doors into your cloud and why Brian insists that true security isn’t something you bolt on later - it’s a culture you build from day one.
undefined
Aug 15, 2025 • 49min

Ep.85 - Subterfuge and Social Engineering // Matthew Toussain

Join host James Maude for a candid conversation with Matthew Toussaint - founder of Open Security and mastermind behind the legendary Subterfuge framework that once forced Starbucks to overhaul its Wi-Fi security. From his unexpected path as an aspiring Air Force lawyer to becoming a renowned cybersecurity educator, Matthew shares a lifetime of stories: a physical pen test that went spectacularly wrong at a franchise location, a medical clinic investigation that exposed an insider threat with international stakes, and how old-school phone-based social engineering works in the age of identity threats. They dive into why AI is about to make help desk social engineering terrifyingly scalable, how a nervous 21-year-old’s DefCon talk reshaped network security, and why, despite decades of warnings, the industry is still failing at the basics while attackers rapidly scale with artificial intelligence.
undefined
Aug 1, 2025 • 55min

Ep. 84 - Catching the Csaba Richter Hacker // Miguel Clarke

Former FBI Supervisory Special Agent Miguel Clarke joins hosts James Maude and Marc Maiffret to reflect on 25 years at the front lines of cybersecurity. From coding in BASIC on his Commodore 64 to helping uncover the digital trail behind 9/11, Miguel shares raw, behind-the-scenes stories of how real cyber investigations unfold. In this episode, you'll hear how a casual beer in Nebraska sparked a career in federal law enforcement, why psychology plays a critical role in executing search warrants, and how early cyber sleuths tracked international hackers with nothing but screen scrapes and UUencoded files. Miguel also takes us deep inside the Swedish secret police operation that caught the infamous Csaba Richter hacker, explores the rise of Eastern Europe’s cybercrime economy, and breaks down the forensic breakthroughs that helped investigators piece together one of the most pivotal events in modern history. 00:00 - Introduction and Welcome 01:32 - Early Technology Interest with Commodore Computers 03:24 - System Shock and the $2,100 Computer Upgrade Nightmare 05:22 - Gaming Influence on Career Path and FBI Power Dynamics 06:42 - The Beer That Started an FBI Career 10:03 - FBI Training and Imposter Syndrome at Quantico 14:11 - Sales Skills Meet FBI Investigation Work 18:04 - Search Warrant Psychology and Family Dynamics 24:08 - The Chaba Richter International Cyber Case 27:38 - Eastern European Cybercrime Economy Theory 31:51 - Evolution from Website Defacements to Nation-State Attacks 36:24 - Digital Aspects of 9/11 Investigation 42:25 - 9/11 Digital Forensics and HTML Tag Discovery 47:56 - Transition from FBI to Private Sector 51:32 - Leadership Philosophy and Closing Thoughts
undefined
Jul 18, 2025 • 55min

Ep. 83 - The Bug Bounty That Bought a Mini Donkey // Tommy DeVoss (dawgyg)

Tommy DeVoss—aka "dawgyg"—is back for round two, and it’s even wilder. A former black hat who faced prison four times, Tommy turned his life around and became a legend in the bug bounty world. From max-sec prison cells to flexing a championship belt on stage at HackerOne Live, his story is pure hacker folklore. In this episode, he shares how bug bounties bought him mini donkeys, why he still hunts old-school (no tools, no scripts), and how federal judges, rogue AIs, and childhood IRC wars shaped his chaotic path. Expect redemption arcs, sketchy bets, and a surprise detour into Icelandic youth basketball.
undefined
Jul 4, 2025 • 1h 6min

Ep. 82 – Security Tools Are Failing: Lessons from the 2025 Microsoft Vulnerability Report

BeyondTrust's 2025 Microsoft Vulnerability Report dropped—and it’s a wake-up call. With 1,360 new vulnerabilities and elevation of privilege attacks dominating the landscape, even insurance companies are backing away from covering privileged service accounts. In this special episode, cybersecurity veterans James Maude, Paula Januszkiewicz, Sami Laiho, Kip Boyle, and Charles Henderson dig into what the data from the 2025 report really means. Forget the fearmongering—this is about clear-headed, field-tested advice. You’ll hear why flashy security tools often sit unused, how simple controls could prevent 60% of attacks, and why "secure by default" still hasn’t delivered. From AI-driven vulnerability discovery to cloud missteps that could sink your stack, this isn’t your usual “patch faster” sermon—it’s a blueprint for getting real results. If you’re overwhelmed by alerts, underwhelmed by your security stack, or just tired of doing more with less, this episode is your lifeline.
undefined
Jun 20, 2025 • 58min

Ep. 81 - From DVWA to Nerf Wars: Tales of DigiNinja // Robin Wood

In today’s episode, James Maude chats with Robin Wood—better known as “DigiNinja”—the creator of DVWA and co-founder of SteelCon. Robin shares wild stories from his hacking career, including an infamous SQL injection that accidentally overwrote every customer’s credit card info on a gambling site, how he took down entire client networks with just two packets, and the origins of the UK’s most eccentric security conference, SteelCon—featuring 450 stuffed whippets and full-on Nerf gun warfare.
undefined
Jun 6, 2025 • 59min

Ep. 80 - Vampire Satellites, Stolen Wine, and Why Your Boat is a Giant IoT Nightmare // Chris Kubecka

In today's episode, James Maude dives into the world of cyber warfare, espionage, and hacked satellites with the legendary Chris Kubecka—aka the "Chief Hacktress." From grounding overconfident pilots as one of the first female C-5 loadmasters, to investigating mysterious “vampire satellites” that silently disable spacecraft, Chris has lived a life straight out of a cyber-thriller. She recounts her front-line role in the aftermath of the Shamoon cyberattack, one of the most destructive digital assaults in history, which wiped 35,000 systems at Saudi Aramco and sent shockwaves across global security circles. Plus: embassy cyber drama, Turkish spies posing as English students, Yemeni drones with a grudge, and how AI is now a tool in her mission to expose and disrupt digital authoritarianism. And yes, we also talk about why your boat is a terrifying floating IoT vulnerability.
undefined
May 23, 2025 • 49min

Ep. 79 - Hacking Rifles and Protecting Reporters // Runa Sandvik

In this episode, host James Maude sits down with Runa Sandvik, a cybersecurity pioneer protecting journalists and vulnerable populations worldwide. From hacking wi-fi enabled rifles to creating secure tip systems for The New York Times, Runa shares the fascinating journey that led her from Norway's tight-knit tech scene to the frontlines of digital security. 

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app