Episode
Ep 13: Carna Botnet
Description
In 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerable in the book. And the data that came out of it was amazing. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
A security researcher discovered that many computers use default username and password combinations such as admin admin or root root, making them vulnerable to unauthorized access.
00:00 - 03:37 (03:37)
Summary
A security researcher discovered that many computers use default username and password combinations such as admin admin or root root, making them vulnerable to unauthorized access. The researcher scanned the internet to investigate the prevalence of these default settings on systems running Telnet.
EpisodeEp 13: Carna Botnet
PodcastDarknet Diaries
A researcher created a program that would scan and find unprotected systems, then upload the program to the systems to work scanning for more systems.
03:37 - 12:21 (08:43)
Summary
A researcher created a program that would scan and find unprotected systems, then upload the program to the systems to work scanning for more systems. With billions of probes and data points collected from the Karna botnet, the researcher analyzed the data to make sense of it before shutting down the botnet.
EpisodeEp 13: Carna Botnet
PodcastDarknet Diaries
A security researcher created a stunning animated map, that displays the internet's 24-hour cycle and what hour of the day different parts of the world come online and go offline.
12:21 - 17:53 (05:32)
Summary
A security researcher created a stunning animated map, that displays the internet's 24-hour cycle and what hour of the day different parts of the world come online and go offline. The map went viral, because of its beauty, and showcased the extent of internet activity and how interconnected activities are globally.
EpisodeEp 13: Carna Botnet
PodcastDarknet Diaries
A researcher shares the full list of all 1.2 million vulnerable devices to a security expert, containing information such as MAC addresses, manufacturers, RAM, UNAME, CPU info, and IPs.
17:53 - 23:41 (05:47)
Summary
A researcher shares the full list of all 1.2 million vulnerable devices to a security expert, containing information such as MAC addresses, manufacturers, RAM, UNAME, CPU info, and IPs. The expert organized the data to determine the countries with the most vulnerable devices and the manufacturers creating them.
EpisodeEp 13: Carna Botnet
PodcastDarknet Diaries
A researcher decompressed illegally obtained data to access raw data and provide legitimate research.
23:41 - 31:52 (08:11)
Summary
A researcher decompressed illegally obtained data to access raw data and provide legitimate research. While some people in the security community condemn the use of such data for any research, others believe that the researcher also wanted to fix the problem, which is why he provided the data.
EpisodeEp 13: Carna Botnet
PodcastDarknet Diaries
The battle against default credentials and open telnet is a long one and it is hard to get manufacturers to pay attention through public channels, as they might be more defensive than willing to listen.
31:52 - 35:29 (03:36)
Summary
The battle against default credentials and open telnet is a long one and it is hard to get manufacturers to pay attention through public channels, as they might be more defensive than willing to listen. However, one can participate in subcommittees to directly communicate with manufacturers to avoid relying on mainstream communication channels.