Chapter
Clips
John and Adam found almost 30 different URL shorteners used by this darkin hacking group.
22:47 - 24:10 (01:23)
Summary
John and Adam found almost 30 different URL shorteners used by this darkin hacking group. They kept enumerating and pulling out long URLs, then extracting target emails, which grew to thousands of email addresses in their database.
ChapterTarget Analysis and Hacking Suspicions
Episode79: Dark Basin
PodcastDarknet Diaries
The process of analyzing hacker targets involves building maps and clusters of where targets are located and what kind of businesses they work for to identify any commonalities between them and determine the motive behind the attacks.
24:10 - 27:04 (02:54)
Summary
The process of analyzing hacker targets involves building maps and clusters of where targets are located and what kind of businesses they work for to identify any commonalities between them and determine the motive behind the attacks.