Chapter

Mysteries of a Missing Widget Machine
listen on Spotify
01:38 - 11:16 (09:38)

Despite having access to the LLC's emails and wikis, the company's different teams have no information on the specific widget name of a new product being built out. The source code for the widget machine is also nowhere to be found.

Clips
In this episode, Jack Recider shares the story of Mubix, a former penetration tester, who mistakenly hacked into an unexpected system during one of his routine tests.
01:38 - 03:15 (01:37)
listen on Spotify
Cybersecurity
Summary

In this episode, Jack Recider shares the story of Mubix, a former penetration tester, who mistakenly hacked into an unexpected system during one of his routine tests.

Chapter
Mysteries of a Missing Widget Machine
Episode
Ep 22: Mini-Stories: Vol 1
Podcast
Darknet Diaries
Mubix and team struggle to obtain information on a specific widget machine and resort to setting up a phish to gain access while acknowledging the lack of proper security measures in the target company.
03:15 - 07:30 (04:15)
listen on Spotify
Cybersecurity
Summary

Mubix and team struggle to obtain information on a specific widget machine and resort to setting up a phish to gain access while acknowledging the lack of proper security measures in the target company.

Chapter
Mysteries of a Missing Widget Machine
Episode
Ep 22: Mini-Stories: Vol 1
Podcast
Darknet Diaries
Mubix and his team conduct a thorough search of all company documents and systems for a widget maker system, including emails, wikis, and shares, but come up empty.
07:32 - 09:04 (01:32)
listen on Spotify
Target System
Summary

Mubix and his team conduct a thorough search of all company documents and systems for a widget maker system, including emails, wikis, and shares, but come up empty. They also note that they do not typically have admin access to shared systems.

Chapter
Mysteries of a Missing Widget Machine
Episode
Ep 22: Mini-Stories: Vol 1
Podcast
Darknet Diaries
Mistaken identity can happen in cybersecurity too, as demonstrated by a client whose phone conversations were intercepted due to a one-digit difference in the IP range of their intended recipient.
09:04 - 11:16 (02:11)
listen on Spotify
Cybersecurity
Summary

Mistaken identity can happen in cybersecurity too, as demonstrated by a client whose phone conversations were intercepted due to a one-digit difference in the IP range of their intended recipient.

Chapter
Mysteries of a Missing Widget Machine
Episode
Ep 22: Mini-Stories: Vol 1
Podcast
Darknet Diaries