Chapter

Target Analysis and Hacking Suspicions
listen on Spotify
22:47 - 27:04 (04:17)

The hosts delve into the process of analyzing hacker targets and use the commonalities between targets to deduce who might have an interest in targeting them.

Clips
John and Adam found almost 30 different URL shorteners used by this darkin hacking group.
22:47 - 24:10 (01:23)
listen on Spotify
Hacking
Summary

John and Adam found almost 30 different URL shorteners used by this darkin hacking group. They kept enumerating and pulling out long URLs, then extracting target emails, which grew to thousands of email addresses in their database.

Chapter
Target Analysis and Hacking Suspicions
Episode
79: Dark Basin
Podcast
Darknet Diaries
The process of analyzing hacker targets involves building maps and clusters of where targets are located and what kind of businesses they work for to identify any commonalities between them and determine the motive behind the attacks.
24:10 - 27:04 (02:54)
listen on Spotify
Cybersecurity
Summary

The process of analyzing hacker targets involves building maps and clusters of where targets are located and what kind of businesses they work for to identify any commonalities between them and determine the motive behind the attacks.

Chapter
Target Analysis and Hacking Suspicions
Episode
79: Dark Basin
Podcast
Darknet Diaries