Chapter
Clips
A LinkedIn engineer’s blog got hacked after a hacker exploited the site’s PHP back-end technology and uploaded a malicious PHP file.
06:37 - 07:57 (01:19)
Summary
A LinkedIn engineer’s blog got hacked after a hacker exploited the site’s PHP back-end technology and uploaded a malicious PHP file. The hacker gained shell access to the web server and used the engineer’s username to attempt to brute-force login to an iMac on the same network.
ChapterHow a Hacker Stole Private Key to LinkedIn
Episode86: The LinkedIn Incident
PodcastDarknet Diaries
An explanation on how public and private keys can be used instead of a username and password to log into certain systems, with an example of a hacker gaining access to a private key for LinkedIn from a virtual machine on the host computer.
07:57 - 10:20 (02:23)
Summary
An explanation on how public and private keys can be used instead of a username and password to log into certain systems, with an example of a hacker gaining access to a private key for LinkedIn from a virtual machine on the host computer.
ChapterHow a Hacker Stole Private Key to LinkedIn
Episode86: The LinkedIn Incident
PodcastDarknet Diaries
The LinkedIn Security Team set up a “war room” to verify the data being sold online after a data breach.
10:20 - 12:40 (02:20)
Summary
The LinkedIn Security Team set up a “war room” to verify the data being sold online after a data breach. Through hunting events and logs, they found evidence of user data breach and took immediate action to mitigate the situation.