goodlisten

Clip

The Reveton ransomware was hidden in a porn advert
listen on Spotify
06:21 - 09:29 (03:08)

The Reveton ransomware was distributed via the Angler exploit kit after being placed into an adult product advertisement. The exploit kit was designed to target outdated software on users computers.

Similar Clips
The malware EternalBlue exploited a vulnerability in Windows' server message block, leading to a rise in ransomware attacks and the spread of the worm WannaCry.
07:17 - 12:50 (05:32)
listen on Spotify
Cybersecurity
Summary

The malware EternalBlue exploited a vulnerability in Windows' server message block, leading to a rise in ransomware attacks and the spread of the worm WannaCry. The worm could easily spread to other computers by stealing usernames and passwords and using them to log in and infect other systems.

Chapter
The NotPetya Virus - Malware That Took Down Industry
Episode
54: NotPetya
Podcast
Darknet Diaries
The speaker reminisces about his past experiences with hacking and illegal Trojan horses in high school, praising the sophisticated hacking abilities of anonymous hackers.
48:03 - 48:49 (00:46)
listen on Spotify
Hacking
Summary

The speaker reminisces about his past experiences with hacking and illegal Trojan horses in high school, praising the sophisticated hacking abilities of anonymous hackers.

Chapter
Hacking as a Kid
Episode
Ep 358 - Fauci Ouchie (feat. Mike Recine & Sean McCarthy)
Podcast
Matt and Shane's Secret Podcast
Offcrack is a tool that performs brute force password cracking by searching through millions of hashes to find the matching password in Windows, making it an effective and popular tool for recovering lost or forgotten passwords.
19:25 - 22:01 (02:36)
listen on Spotify
Password cracking
Summary

Offcrack is a tool that performs brute force password cracking by searching through millions of hashes to find the matching password in Windows, making it an effective and popular tool for recovering lost or forgotten passwords.

Chapter
Using Offcrack to Find Windows Passwords
Episode
70: Ghost Exodus
Podcast
Darknet Diaries
Zero day exploits are valuable to a number of buyers such as nation states or criminal groups.
13:37 - 18:23 (04:46)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

Zero day exploits are valuable to a number of buyers such as nation states or criminal groups. Hackers can make six figures by offering these exploits to contractors and keeping their mouths shut about the transaction.

Chapter
iOS Zero Day Exploits Easier to Find Than Android's
Episode
#266 – Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar
Podcast
Lex Fridman Podcast
The speaker discusses his concerns about the legal implications of using Metasploit and sharing it with others, and whether or not there were any safeguards or terms of use that could protect him from legal troubles.
54:09 - 58:18 (04:09)
listen on Spotify
Legal, Metasploit
Summary

The speaker discusses his concerns about the legal implications of using Metasploit and sharing it with others, and whether or not there were any safeguards or terms of use that could protect him from legal troubles.

Chapter
Liability concerns for Metasploit
Episode
114: HD
Podcast
Darknet Diaries