Chapter
Clips
The speaker is contemplating whether to leave a hacker logged into a system to avoid missing out on information they need to catch the hacker, or to revoke their access immediately and eliminate the risk of further harm.
27:23 - 29:26 (02:03)
Summary
The speaker is contemplating whether to leave a hacker logged into a system to avoid missing out on information they need to catch the hacker, or to revoke their access immediately and eliminate the risk of further harm.
ChapterResponding to a Cyber Attack on a Municipal Office
Episode96: The Police Station Incident
PodcastDarknet Diaries
A security consultant recounts asking a monitoring company for help during an incident response with a police department - specifically, requesting logs, data, and malware samples in order to investigate.
29:26 - 33:55 (04:28)
Summary
A security consultant recounts asking a monitoring company for help during an incident response with a police department - specifically, requesting logs, data, and malware samples in order to investigate. The company was initially hesitant to cooperate with the Secret Service but later relented once permission from relevant parties was confirmed.
ChapterResponding to a Cyber Attack on a Municipal Office
Episode96: The Police Station Incident
PodcastDarknet Diaries
The speaker shares their experience of how they dealt with unauthorized access to a remote desktop system and advises on the importance of having secure access to such systems, especially in the case of police departments or sensitive information.
33:55 - 36:01 (02:06)
Summary
The speaker shares their experience of how they dealt with unauthorized access to a remote desktop system and advises on the importance of having secure access to such systems, especially in the case of police departments or sensitive information.