Chapter

How a Hacker Stole Private Key to LinkedIn
listen on Spotify
06:37 - 12:40 (06:03)

A hacker managed to escape out of a virtual machine and onto the host computer by finding a private key to LinkedIn. This highlights the importance of secure logins through public and private keys.

Clips
A LinkedIn engineer’s blog got hacked after a hacker exploited the site’s PHP back-end technology and uploaded a malicious PHP file.
06:37 - 07:57 (01:19)
listen on Spotify
Hacking
Summary

A LinkedIn engineer’s blog got hacked after a hacker exploited the site’s PHP back-end technology and uploaded a malicious PHP file. The hacker gained shell access to the web server and used the engineer’s username to attempt to brute-force login to an iMac on the same network.

Chapter
How a Hacker Stole Private Key to LinkedIn
Episode
86: The LinkedIn Incident
Podcast
Darknet Diaries
An explanation on how public and private keys can be used instead of a username and password to log into certain systems, with an example of a hacker gaining access to a private key for LinkedIn from a virtual machine on the host computer.
07:57 - 10:20 (02:23)
listen on Spotify
Cybersecurity
Summary

An explanation on how public and private keys can be used instead of a username and password to log into certain systems, with an example of a hacker gaining access to a private key for LinkedIn from a virtual machine on the host computer.

Chapter
How a Hacker Stole Private Key to LinkedIn
Episode
86: The LinkedIn Incident
Podcast
Darknet Diaries
The LinkedIn Security Team set up a “war room” to verify the data being sold online after a data breach.
10:20 - 12:40 (02:20)
listen on Spotify
Cybersecurity
Summary

The LinkedIn Security Team set up a “war room” to verify the data being sold online after a data breach. Through hunting events and logs, they found evidence of user data breach and took immediate action to mitigate the situation.

Chapter
How a Hacker Stole Private Key to LinkedIn
Episode
86: The LinkedIn Incident
Podcast
Darknet Diaries