Chris Rock - Darknet Diaries Recap

Podcast: Darknet Diaries

Published: 2024-11-05

Duration: 58 min

Summary

In this episode, host Jack Recider interviews Chris Rock, an Australian security researcher with a controversial background spanning black hat and white hat hacking. The conversation reveals his unfiltered views on the hacking world and his journey from childhood hacker to CISO of a tech company.

What Happened

The episode begins with a content warning about the use of swear words, leading into a discussion about Chris Rock, an Australian security researcher—not to be confused with the comedian of the same name. Jack Recider highlights that Rock has been on his radar for a decade, but as they talk, it becomes clear that Rock is much more than just a researcher. He candidly shares that he's done black hat work since he was 11 years old, indicating a deep and long-standing engagement with hacking beyond just the ethical side of it.

Rock explains his perspective on the hacking community, stating, "I don’t give a shit whether it’s white or black. Are you a hacker? Yes." He admits to having participated in various black hat activities throughout his career, including hacking banks, government institutions, and large corporations for exploratory purposes. Rock emphasizes that for him, hacking is often more about the challenge than any moral implications, saying, "For me, it’s an exercise. Like, it’s just, you know, can you do it? Yes, no, transfer." This stark honesty about his experiences paints a vivid picture of the complexities and motivations within the hacking community.

As the conversation unfolds, Rock reflects on his background, starting with his first computer, an Atari 2600, and his eventual transition into pen testing. He describes his career path, which led him to establish his own pen testing company after years of working in banking and security. He elaborates on the importance of experience in the field, noting that those who get caught doing illegal activities often lack the expertise that comes with years of practice. With a mix of expertise and candidness, Rock provides listeners with a unique glimpse into the life of a hacker who straddles the line between legality and criminality.

Key Insights

Key Questions Answered

What is Chris Rock's background in hacking?

Chris Rock's journey in hacking began when his parents gifted him an Atari 2600, which led to a lifelong passion. He transitioned from early gaming systems to more advanced technology, spending significant time in front of computers from a young age. Rock's interest evolved into a career in security, with substantial experience in both black hat and white hat hacking.

What does Chris Rock think about the ethics of hacking?

Rock expresses a candid view on the ethics of hacking, stating that he doesn't differentiate between white hat and black hat activities. He believes that many individuals in the hacking community share similar sentiments, often downplaying the moral aspects to maintain their professional personas. For Rock, the thrill and challenge of hacking are paramount.

What types of organizations has Chris Rock hacked?

Throughout his career, Rock has engaged in hacking various organizations, including banks, government institutions, telecommunications, and large oil companies. He refers to these activities as 'normal stuff' for black hat hackers, emphasizing that they are often exploratory in nature rather than purely criminal.

How did Chris Rock transition to a career in pen testing?

After spending a decade in the banking sector, Rock sought to move into penetration testing. He established his own pen testing company, leveraging his extensive experience in the field. His work in this area eventually led him to develop a security platform that gained traction in the market.

What advice does Chris Rock have for those in hacking?

Rock advises that experience is key in the hacking world. He notes that those who get caught often lack the necessary expertise, implying that skill and knowledge are crucial for navigating the complexities of hacking. His long history in the field has made him adept at avoiding legal repercussions while still engaging in high-stakes activities.