goodlisten

Clip

How to hack a company: simple steps to exploit vulnerabilities
listen on Spotify
18:25 - 19:16 (00:51)

The attackers found a staging server and attempted to exploit vulnerabilities using a tool called Mimikatz, which digs passwords out of memory, to escalate privileges and access other servers.

Similar Clips
The team found malware in the memory, but upon closer inspection discovered a note by the malware writer that was meant for forensic investigators looking for it.
33:07 - 34:19 (01:11)
listen on Spotify
Cybersecurity
Summary

The team found malware in the memory, but upon closer inspection discovered a note by the malware writer that was meant for forensic investigators looking for it.

Chapter
Importance of Immediate Management Action in Response to Malware Detection
Episode
103: Cloud Hopper
Podcast
Darknet Diaries
An explanation on how public and private keys can be used instead of a username and password to log into certain systems, with an example of a hacker gaining access to a private key for LinkedIn from a virtual machine on the host computer.
07:57 - 10:20 (02:23)
listen on Spotify
Cybersecurity
Summary

An explanation on how public and private keys can be used instead of a username and password to log into certain systems, with an example of a hacker gaining access to a private key for LinkedIn from a virtual machine on the host computer.

Chapter
How a Hacker Stole Private Key to LinkedIn
Episode
86: The LinkedIn Incident
Podcast
Darknet Diaries
This podcast discusses the potential consequences of data breaches and provides examples of major websites that have suffered from them, including Adobe, Alaska Voter Database, Apple, Adult Friend Finder, and Android Forums.
39:58 - 42:25 (02:27)
listen on Spotify
Data Breaches
Summary

This podcast discusses the potential consequences of data breaches and provides examples of major websites that have suffered from them, including Adobe, Alaska Voter Database, Apple, Adult Friend Finder, and Android Forums.

Chapter
Sim Swapping and Bank Fraud
Episode
112: Dirty Coms
Podcast
Darknet Diaries
A hacker gained access to the entire user database of VTech, a company that produces educational toys and gadgets for children, compromising sensitive personal information of millions of users, including first and last names, email addresses, encrypted passwords, secret questions and answers, home addresses, and IP addresses.
05:09 - 06:50 (01:41)
listen on Spotify
Cybersecurity
Summary

A hacker gained access to the entire user database of VTech, a company that produces educational toys and gadgets for children, compromising sensitive personal information of millions of users, including first and last names, email addresses, encrypted passwords, secret questions and answers, home addresses, and IP addresses.

Chapter
Hacker breaches children's personal data for their own protection
Episode
Ep 2: The Peculiar Case of the VTech Hacker
Podcast
Darknet Diaries
The malware EternalBlue exploited a vulnerability in Windows' server message block, leading to a rise in ransomware attacks and the spread of the worm WannaCry.
07:17 - 12:50 (05:32)
listen on Spotify
Cybersecurity
Summary

The malware EternalBlue exploited a vulnerability in Windows' server message block, leading to a rise in ransomware attacks and the spread of the worm WannaCry. The worm could easily spread to other computers by stealing usernames and passwords and using them to log in and infect other systems.

Chapter
The NotPetya Virus - Malware That Took Down Industry
Episode
54: NotPetya
Podcast
Darknet Diaries