Hacker Answers Penetration Test Questions From Twitter | Tech Support | WIRED

Hacker and expert security consultant Jayson E. Street joins WIRED to answer your penetration test questions from Twitter. What does penetration testing entail? What are some of the most underrated physical tools used for pen tests? How can I tell if my home wifi network is compromised?

Director: Justin Wolfson
Director of Photography: Rahil Ashruff
Editor: Richard Trammell
Expert: Jayson E. Street
Line Producer: Joseph Buscemi
Associate Producer: Brandon White
Production Manager: D. Eric Martinez
Production Coordinator: Fernando Davila
Casting Producer: Nicholas Sawyer
Camera Operator: Cloud
Sound Mixer: Brett Van Deusen
Production Assistant: Sonia Butt
Post Production Supervisor: Alexa Deutsch
Post Production Coordinator: Ian Bryant
Supervising Editor: Doug Larsen
Additional Editor: Paul Tael
Assistant Editor: Lauren Worona

Still haven’t subscribed to WIRED on YouTube? ►► http://wrd.cm/15fP7B7
Listen to the Get WIRED podcast ►► https://link.chtbl.com/wired-ytc-desc
Want more WIRED? Get the magazine ►► https://subscribe.wired.com/subscribe/splits/wired/WIR_YouTube?source=EDT_WIR_YouTube_0_Video_Description_ZZ

Follow WIRED:
Instagram ►►https://instagram.com/wired
Twitter ►►http://www.twitter.com/wired
Facebook ►►https://www.facebook.com/wired
Tik Tok ►►https://www.tiktok.com/@wired

Get more incredible stories on science and tech with our daily newsletter: https://wrd.cm/DailyYT

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized. Through thought-provoking stories and videos, WIRED explores the future of business, innovation, and culture.

20 thoughts on “Hacker Answers Penetration Test Questions From Twitter | Tech Support | WIRED

  1. Best movie ever about physical pen testing: Sneakers (1992), with Aykroyd, Kingsley, Phoenix, Poitier, Redford, and more (such a great cast). Research, online hacking, social engineering, all the stuff.

  2. “What’s a hacker look like?” Well if you’re really unlucky an Otis elevator repair man. 😂

  3. I guess hacking isn’t boring to us because we know what is happening behind the text commands.

  4. Doesnt that proxmark need to be right up on the card to clone it. Thats more for writing and reading cards, highly unlikely u can use that to read a card off someone going through a door like u said….

  5. I wish I could program employees. Despite me telling everyone; “Our company will not ask you for any financial information” Employees still click on the phish email and loose thousands of dollars. Then expect us to reimburse them.

  6. 9:30 you don’t even need to click a link or anything. Pegasus spyware can gain access to your phone if the attacker has your number, that’s all that’s needed.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.