Chapter
Uncovering the Vulnerable Internet Devices with a Botnet
A researcher shares the full list of all 1.2 million vulnerable devices to a security expert, containing information such as MAC addresses, manufacturers, RAM, UNAME, CPU info, and IPs. The expert organized the data to determine the countries with the most vulnerable devices and the manufacturers creating them.
Clips
The speaker explains how they requested the compromised IPs used for a botnet scan in Australia and sought guidance from senior members due to potential illegality of Karna botnet.
17:53 - 19:58 (02:04)
Summary
The speaker explains how they requested the compromised IPs used for a botnet scan in Australia and sought guidance from senior members due to potential illegality of Karna botnet.
ChapterUncovering the Vulnerable Internet Devices with a Botnet
EpisodeEp 13: Carna Botnet
PodcastDarknet Diaries
A researcher used a botnet to scan for vulnerable devices, and was able to compile a list of 1.2 million devices with their MAC addresses, manufacturers, RAM, UNAME, CPU info, IPs, and country codes, showing which countries and manufacturers are most at risk for attacks.
19:58 - 23:41 (03:42)
Summary
A researcher used a botnet to scan for vulnerable devices, and was able to compile a list of 1.2 million devices with their MAC addresses, manufacturers, RAM, UNAME, CPU info, IPs, and country codes, showing which countries and manufacturers are most at risk for attacks.