goodlisten

Chapter

How hackers steal credit card information using Hydra
listen on Spotify
52:34 - 1:01:30 (08:56)

The hacker would run Hydra to find servers with open ports, then access the software handling credit card transactions to steal sensitive information, or use the software to try to log in and access the cash register directly to get the data. The process of finding open Wi-Fi and breaking into cash registers is a long and challenging process.

Clips
Cam shares how he targets small businesses by scanning their Wi-Fi networks for open ports, with hopes of finding the 3389 RDP remote desktop port open on their cash register systems.
52:34 - 53:47 (01:12)
listen on Spotify
Wi-Fi security
Summary

Cam shares how he targets small businesses by scanning their Wi-Fi networks for open ports, with hopes of finding the 3389 RDP remote desktop port open on their cash register systems. Once found, he remotely accesses the system to steal credit card data and other confidential information.

Chapter
How hackers steal credit card information using Hydra
Episode
85: Cam the Carder
Podcast
Darknet Diaries
A hacker shares how he uses Hydra to crack weak passwords by trying different combinations of usernames and passwords on a website or network.
53:47 - 55:40 (01:52)
listen on Spotify
Cybersecurity
Summary

A hacker shares how he uses Hydra to crack weak passwords by trying different combinations of usernames and passwords on a website or network.

Chapter
How hackers steal credit card information using Hydra
Episode
85: Cam the Carder
Podcast
Darknet Diaries
Cam, a hacker, explains his process of buying and stealing credit card information, including his use of a debugger to search for strings matching a specific algorithm.
55:40 - 58:10 (02:30)
listen on Spotify
Credit card hacking
Summary

Cam, a hacker, explains his process of buying and stealing credit card information, including his use of a debugger to search for strings matching a specific algorithm. He also addresses the question of credit card software security in databases.

Chapter
How hackers steal credit card information using Hydra
Episode
85: Cam the Carder
Podcast
Darknet Diaries
The use of Hydra software helped a hacker gain access to credit card information stored in the point of sale systems of a coffee shop, restaurant, bar, and bakery, by exploiting the default usernames and passwords of their remote desktop protocol.
58:10 - 1:01:30 (03:20)
listen on Spotify
Cybersecurity
Summary

The use of Hydra software helped a hacker gain access to credit card information stored in the point of sale systems of a coffee shop, restaurant, bar, and bakery, by exploiting the default usernames and passwords of their remote desktop protocol.

Chapter
How hackers steal credit card information using Hydra
Episode
85: Cam the Carder
Podcast
Darknet Diaries