Logo
    Search

    Hotline Hacked Vol. 3

    enJune 02, 2024

    Podcast Summary

    • High school hacking pranksInadvertently hacking a school network can lead to unintended consequences, even if no damage is caused, and highlights the importance of network security.

      Inadvertently challenging high school students, especially those with a strong interest in technology, can lead to unexpected consequences. In the shared story, two high school students successfully hacked their school's network and modified the website for their senior prank. Although they were careful and didn't cause any damage, they were caught due to being the likely suspects. This experience taught them a valuable lesson about the potential risks and consequences of their actions. The story also highlights the importance of security in school networks and the fact that even technical staff may not always prioritize it. Additionally, the anecdote brings up the idea that there's a rich history of hacking stories centered around playful pranks or just playing a song over someone else's system.

    • Consequences of breaking rulesActions with seemingly harmless consequences can have unintended and far-reaching results, potentially causing chaos or leading to discovery and consequences.

      Breaking the rules, whether it's through hacking a radio station to play a song on repeat or attempting to intercept large institutional data through ARP spoofing, can have unintended and far-reaching consequences. In the first instance, a prank caused the song to surge in popularity, but it also disrupted normal broadcasting and potentially caused chaos. In the second instance, an individual's reckless actions led to discovery and potential consequences. The moral of the story is that while it may be tempting to take a peek or leave a little signature, the potential risks and consequences can outweigh any potential benefits. The actions of the prankster and the hacker demonstrate the importance of considering the potential impact of one's actions and the importance of being aware of the potential risks and consequences. It's a reminder that even seemingly harmless actions can have unintended consequences, and it's essential to think before acting.

    • Network DisruptionsUnintentional actions can cause widespread network disruptions, making it crucial to be aware of potential impacts and communicate effectively when encountering technical difficulties

      Even unintentional actions can cause significant network disruptions, as illustrated in the story of a pen tester named Tonsko. Tonsko was conducting a test to gather data, but his actions inadvertently caused widespread European network outages by spoofing and bottlenecking the network connections. The intermittent nature of the problem made it difficult to diagnose and troubleshoot, leading to a headache for the company. This incident highlights the importance of being aware of the potential impact of one's actions in a technical environment and the challenges of dealing with intermittent issues. Additionally, the story underscores the significance of proper communication and transparency when encountering technical difficulties. Despite the unintended consequences, Tonsko was able to provide valuable technical context and insights, but the incident left a lasting impression on the company and may have led to negative consequences for those involved.

    • Security consequencesMinor vulnerabilities or errors can lead to major consequences, emphasizing the importance of thorough testing and understanding tool capabilities, as well as being aware of publicly available data risks and the potential consequences of ignoring security threats.

      Security vulnerabilities, even those that seem minor or intermittent, can have significant consequences. The stories shared in the discussion illustrate this point. In the first instance, a technical issue with Tonsko's LARIATE caused a major shutdown. In another instance, a tester accidentally deleted a website using Burp Suite while testing. These incidents highlight the importance of thorough testing and understanding the capabilities and limitations of tools. Another theme that emerged is the risk of publicly available data. One person found a way to access a large repository of leads by manipulating URLs. This data was being sold for thousands of dollars, but the speaker was able to access it for free. The discussion also touched on the issue of third-party data brokers and the risks associated with purchasing leads from them. Lastly, the discussion highlighted the importance of being aware of security risks and the potential consequences of ignoring them. One speaker mentioned an increase in phishing attacks and unwanted newsletters, which suggests that their email account had been compromised. These incidents serve as reminders to be vigilant and take steps to secure personal and professional data.

    • Lead sources and costsUnderstanding the value of leads and their sources, such as third-party or organic, and the associated costs, like CPL and CPM, is crucial for businesses to make informed decisions and maximize potential revenue.

      While third-party leads can be valuable, it's essential to be aware of their potential sources and the risks that come with them, such as data leaks. In the digital world, the value of leads is monetized through Cost Per Lead (CPL), which can be significantly higher than Cost Per Mille (CPM) for advertising. This makes sense for industries where the potential sales are high, like real estate. A realtor, for instance, might be willing to spend thousands of dollars to secure a hot lead, as the potential commission could be substantial. The comparison between CPL and CPM also highlights the importance of understanding the value of your audience and the potential revenue they can bring in. Overall, the discussion underscores the significance of carefully considering the sources and costs of leads and the potential impact they can have on your business.

    • Notion and cybersecurityNotion is a useful tool for managing workflows and projects, but cybersecurity is crucial, especially for businesses. The Center for Internet Security offers resources to create a safer digital world. Be cautious when using convenient features to avoid unintended consequences, like accidentally shutting down a server.

      Notion is a versatile tool used by content creators to manage their workflows and projects, and listeners can try it for free using the link notion.com/hacked. The discussion also highlighted the importance of cybersecurity, particularly for businesses facing increasing threats and regulations. The Center for Internet Security was mentioned as a resource for creating a safer digital world. A cautionary tale was shared about the potential consequences of user error, specifically pasting a list of usernames, including the default "shutdown" account, into a command line, leading to an unintended server shutdown. The story also touched upon the convenience of certain software features, like right-click to paste, which can potentially introduce risks. Overall, the conversation emphasized the importance of being aware of potential risks and taking steps to mitigate them, whether through using the right tools or following best practices.

    • Unexpected consequences of unintuitive solutionsUnintuitive solutions, such as reassigning keyboard shortcuts or using Dvorak keyboard layout, can optimize workflows but also lead to unexpected consequences. It's important to consider the potential risks and ensure they don't disrupt daily workflows or potentially lead to unintended consequences.

      Sometimes, unintuitive solutions created by computer engineers can optimize workflows, but they can also lead to unexpected consequences. The discussion touched upon the idea of reassigning keyboard shortcuts and the use of Dvorak keyboard layout as examples. These solutions, while clever, can be frustrating when users accidentally trigger them or are not used to them. The conversation also mentioned a person's experience with building a new mechanical keyboard and the power of a command and control botnet using a Raspberry Pi. The botnet discussion revealed that someone had control over a powerful botnet capable of sending over 17 million requests per minute. They tried to use it for legitimate purposes, such as joining a bounty program for denial of service attacks on websites. However, they faced limitations since the program only accepted denial of service attacks and not distributed denial of service attacks. The conversation also showcased the importance of understanding the implications of these unconventional solutions and the potential risks they may pose. While they can offer benefits, it's crucial to consider the consequences and ensure that they don't disrupt daily workflows or potentially lead to unintended consequences.

    • Microcomputers and botnetsAffordable microcomputers like Raspberry Pi 3 can function as command and control servers for botnets, causing disruptions or shutting down servers. The ease of use and low cost make them a popular choice for hackers and cybercriminals.

      The world of microcomputers and affordable technology has opened up new possibilities for hacking and control over the internet. The discussion highlighted the example of a botnet controlled by a group, which could potentially shut down servers or cause disruptions. This power is accessible through devices like the Raspberry Pi 3, which can function as a command and control server and cost as little as $50. The ease of use and affordability of such devices has made them a popular choice for hackers and cybercriminals. Additionally, the thread on Reddit showcased the potential risks and consequences of using such technology, as well as the potential for leaving a "hacker computer" behind without a trace. The speaker also touched upon the fascinating world of custom-built hacking devices and the ongoing innovation in the field of microcomputing. Overall, the discussion emphasized the importance of being aware of the potential risks and capabilities of these devices and the ethical considerations that come with them.

    • Technological limitationsThough past technological limitations have led to humorous stories, today's technology offers new opportunities for exploration and disruption

      Technology and its limitations have come a long way since the days of milkshake vending machine mishaps and power-hungry computers. The speaker, who grew up dealing with limited battery life and the consequences of pushing technological boundaries, now encourages listeners to support their favorite podcast and share their own stories. The memories of the past, such as the infamous milkshake incident, remain etched in the mind, but the present offers opportunities to explore and disrupt in new ways. To join the conversation and share your stories, visit hackpodcast.com or hotlinhack.com. School may be out for summer, but the learning and sharing never ends.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices