Chapter
Clips
The speaker shares how he discovered a vulnerability in Verizon's website that allows anyone to obtain the account number of any phone number, which is a data breach.
46:38 - 48:46 (02:07)
Summary
The speaker shares how he discovered a vulnerability in Verizon's website that allows anyone to obtain the account number of any phone number, which is a data breach. He claims to be the only one in the community who knows how to do it now that the bug has been patched, making him the go-to guy for resetting Verizon accounts.
ChapterUnauthorized Access to Telecom Accounts
Episode118: Hot Swaps
PodcastDarknet Diaries
The Marine Corps Doctrine on Warfighting emphasizes the importance of creativity in winning wars, which parallels the competition between hackers and cybersecurity defenders.
48:46 - 49:58 (01:12)
Summary
The Marine Corps Doctrine on Warfighting emphasizes the importance of creativity in winning wars, which parallels the competition between hackers and cybersecurity defenders. The dynamic process of human competition requires knowledge, creativity, and the power of human will, ultimately determining who will prevail.
ChapterUnauthorized Access to Telecom Accounts
Episode118: Hot Swaps
PodcastDarknet Diaries
The speaker discovered a security risk within T-Mobile's system where a user's T-Mobile ID field was accessible and could be used for fraudulent activity such as SIM swapping and stealing crypto.
49:58 - 52:01 (02:02)
Summary
The speaker discovered a security risk within T-Mobile's system where a user's T-Mobile ID field was accessible and could be used for fraudulent activity such as SIM swapping and stealing crypto.
ChapterUnauthorized Access to Telecom Accounts
Episode118: Hot Swaps
PodcastDarknet Diaries
Joseph was a professional hacker who mastered techniques like getting into people's emails, cornering the market on SIM swapping certain carriers, finding vulnerabilities, and stealing cryptocurrencies.
52:01 - 52:50 (00:49)
Summary
Joseph was a professional hacker who mastered techniques like getting into people's emails, cornering the market on SIM swapping certain carriers, finding vulnerabilities, and stealing cryptocurrencies. He targeted newly minted crypto millionaires and even managed to steal more than a million dollars.