goodlisten

Chapter

Hacking Techniques: Remote Desktop Protocol Hacks and Phone Wipes
listen on Spotify
31:52 - 36:42 (04:50)

The hosts discuss the potential dangers of not having strong passwords in a network and the usefulness of wiping a lost phone to protect sensitive information. They also delve into the technique of using remote desktop protocol to hack into different computers and systems.

Clips
Adam hops from one system to another using weak passwords, remoting into a computer in the IT workshop, but finds nothing of value.
31:52 - 33:37 (01:45)
listen on Spotify
Cybersecurity
Summary

Adam hops from one system to another using weak passwords, remoting into a computer in the IT workshop, but finds nothing of value. He then uses an IP scanner to obtain a list of all computers in the network for further exploration.

Chapter
Hacking Techniques: Remote Desktop Protocol Hacks and Phone Wipes
Episode
113: Adam
Podcast
Darknet Diaries
Adam shares his experience of how easy it is to hack into a company's device infrastructure and wipe sensitive information, highlighting the importance of securing company devices.
33:37 - 35:26 (01:49)
listen on Spotify
Cybersecurity
Summary

Adam shares his experience of how easy it is to hack into a company's device infrastructure and wipe sensitive information, highlighting the importance of securing company devices.

Chapter
Hacking Techniques: Remote Desktop Protocol Hacks and Phone Wipes
Episode
113: Adam
Podcast
Darknet Diaries
Adam, a former IT employee, destroys an entire company's data infrastructure after being fired and takes revenge against his former employer.
35:26 - 36:42 (01:15)
listen on Spotify
cybercrime
Summary

Adam, a former IT employee, destroys an entire company's data infrastructure after being fired and takes revenge against his former employer.

Chapter
Hacking Techniques: Remote Desktop Protocol Hacks and Phone Wipes
Episode
113: Adam
Podcast
Darknet Diaries