​

Episode

Ep 13: Carna Botnet
listen on Spotify
35:18
Published: Thu Feb 15 2018
Description

In 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerable in the book. And the data that came out of it was amazing. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Chapters
A security researcher discovered that many computers use default username and password combinations such as admin admin or root root, making them vulnerable to unauthorized access.
00:00 - 03:37 (03:37)
listen on Spotify
Cybersecurity
Summary

A security researcher discovered that many computers use default username and password combinations such as admin admin or root root, making them vulnerable to unauthorized access. The researcher scanned the internet to investigate the prevalence of these default settings on systems running Telnet.

Episode
Ep 13: Carna Botnet
Podcast
Darknet Diaries
A researcher created a program that would scan and find unprotected systems, then upload the program to the systems to work scanning for more systems.
03:37 - 12:21 (08:43)
listen on Spotify
Botnet
Summary

A researcher created a program that would scan and find unprotected systems, then upload the program to the systems to work scanning for more systems. With billions of probes and data points collected from the Karna botnet, the researcher analyzed the data to make sense of it before shutting down the botnet.

Episode
Ep 13: Carna Botnet
Podcast
Darknet Diaries
A security researcher created a stunning animated map, that displays the internet's 24-hour cycle and what hour of the day different parts of the world come online and go offline.
12:21 - 17:53 (05:32)
listen on Spotify
Internet
Summary

A security researcher created a stunning animated map, that displays the internet's 24-hour cycle and what hour of the day different parts of the world come online and go offline. The map went viral, because of its beauty, and showcased the extent of internet activity and how interconnected activities are globally.

Episode
Ep 13: Carna Botnet
Podcast
Darknet Diaries
A researcher shares the full list of all 1.2 million vulnerable devices to a security expert, containing information such as MAC addresses, manufacturers, RAM, UNAME, CPU info, and IPs.
17:53 - 23:41 (05:47)
listen on Spotify
Cybersecurity
Summary

A researcher shares the full list of all 1.2 million vulnerable devices to a security expert, containing information such as MAC addresses, manufacturers, RAM, UNAME, CPU info, and IPs. The expert organized the data to determine the countries with the most vulnerable devices and the manufacturers creating them.

Episode
Ep 13: Carna Botnet
Podcast
Darknet Diaries
A researcher decompressed illegally obtained data to access raw data and provide legitimate research.
23:41 - 31:52 (08:11)
listen on Spotify
Security
Summary

A researcher decompressed illegally obtained data to access raw data and provide legitimate research. While some people in the security community condemn the use of such data for any research, others believe that the researcher also wanted to fix the problem, which is why he provided the data.

Episode
Ep 13: Carna Botnet
Podcast
Darknet Diaries
The battle against default credentials and open telnet is a long one and it is hard to get manufacturers to pay attention through public channels, as they might be more defensive than willing to listen.
31:52 - 35:29 (03:36)
listen on Spotify
Cybersecurity
Summary

The battle against default credentials and open telnet is a long one and it is hard to get manufacturers to pay attention through public channels, as they might be more defensive than willing to listen. However, one can participate in subcommittees to directly communicate with manufacturers to avoid relying on mainstream communication channels.

Episode
Ep 13: Carna Botnet
Podcast
Darknet Diaries