goodlisten

Clip

Network Access Bypass Using MAC Address
listen on Spotify
40:05 - 42:04 (01:58)

Jeremiah was able to bypass network access by changing the MAC address on his computer to match that of the printers on the same network.

Similar Clips
Researcher finds that approximately 800,000 printers are directly accessible on the internet, allowing anyone to send print commands to them, which can lead to security risks.
15:19 - 16:40 (01:20)
listen on Spotify
Internet of Things
Summary

Researcher finds that approximately 800,000 printers are directly accessible on the internet, allowing anyone to send print commands to them, which can lead to security risks.

Chapter
The Danger of Having Printers Directly Connected to the Internet
Episode
Ep 31: Hacker Giraffe
Podcast
Darknet Diaries
The speaker describes how remote access attacks can be carried out despite having state-of-the-art cybersecurity measures in the company.
56:57 - 59:05 (02:07)
listen on Spotify
Cybersecurity
Summary

The speaker describes how remote access attacks can be carried out despite having state-of-the-art cybersecurity measures in the company. This emphasizes the importance of being cautious and vigilant when using a computer.

Chapter
Security Measures for Building Networks
Episode
69: Human Hacker
Podcast
Darknet Diaries
A person found themselves alone in a government building in Puerto Rico and decided to explore the building, looking for unguarded rooms and unlocked computers.
35:13 - 37:48 (02:35)
listen on Spotify
Puerto Rico
Summary

A person found themselves alone in a government building in Puerto Rico and decided to explore the building, looking for unguarded rooms and unlocked computers.

Chapter
Sneaking into a Government Building
Episode
101: Lotería
Podcast
Darknet Diaries
In this podcast, Henry from IT discusses detecting unauthorized remote access software and the importance of digital security while working remotely.
1:28:17 - 1:29:55 (01:37)
listen on Spotify
Digital Security
Summary

In this podcast, Henry from IT discusses detecting unauthorized remote access software and the importance of digital security while working remotely. He praises the importance of individuals taking security measures while online but admits a long way to go in educating average internet users.

Chapter
Security Risks from Reused Passwords
Episode
112: Dirty Coms
Podcast
Darknet Diaries
A developer illegally obtained the source code for Gears of War 3 over a year before its release, causing potential spoilers and security concerns for the game.
41:53 - 44:12 (02:19)
listen on Spotify
Gaming
Summary

A developer illegally obtained the source code for Gears of War 3 over a year before its release, causing potential spoilers and security concerns for the game.

Chapter
Hackers Steal Source Code for Pre-Released Games
Episode
Ep 45: XBox Underground (Part 1)
Podcast
Darknet Diaries