We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions
cover of episode Hotline Hacked Vol. 8

Hotline Hacked Vol. 8

2024/12/23
logo of podcast Hacked

Hacked

AI Deep Dive AI Insights AI Chapters Transcript
People
J
J-Pod
J
Jeremy
领导EAA飞行熟练度中心,推动飞行员培训和安全提升。
匿名加拿大听众
匿名澳大利亚听众
Topics
匿名澳大利亚听众:澳大利亚一个大型互联网服务提供商的调制解调器存在默认SSID和8位数字密码的安全漏洞,攻击者可以通过抓包和使用Hashcat工具破解密码,从而在澳大利亚各地免费获取网络。这种漏洞的存在时间至少三年,表明该互联网服务提供商在安全方面存在严重不足。 该漏洞利用方法简单易行,只需进行Wi-Fi扫描,找到带有默认SSID的网络,抓取握手包,然后使用Hashcat进行密码破解即可。整个过程只需几分钟,即可获得免费的互联网连接。 虽然该听众声称自己并非专业的黑客,但其能够发现并利用该漏洞,也反映出该互联网服务提供商的安全措施存在重大缺陷。 匿名加拿大听众:一个大型杂货店积分计划存在漏洞,攻击者可以利用脚本批量提交虚假积分索赔,从而获得免费积分。最初,该系统缺乏验证码等安全措施,攻击者可以轻松地通过脚本一夜之间获得大量积分。 在漏洞被修复后,该系统增加了10美元消费才能获得10美元积分的限制。然而,攻击者发现可以通过创建多个账户并相互关联,绕过该限制,从而无限获取免费积分。攻击者利用该漏洞,在一年内获得了近10000美元的免费积分。 该听众详细描述了其漏洞利用过程,包括创建多个账户、关联账户、消费和索赔积分等步骤。其操作手法精巧,充分利用了系统漏洞和规则的缺陷。 Jeremy:一个名为PeopleSpy的背景调查应用程序存在安全漏洞,导致用户可以访问其他用户的社会安全号码等敏感信息。该应用程序将用户的敏感信息以纯文本形式存储在设备本地,缺乏必要的安全保护措施。 该听众在使用该应用程序时偶然发现了该漏洞,并联系了应用程序开发者,但开发者对此置之不理。该漏洞的存在,表明该应用程序在设计和开发过程中存在严重的安全缺陷,也反映出个人信息保护的重要性。 该事件也提醒我们,在使用各种应用程序时,需要提高安全意识,保护个人信息安全。 J-Pod:高中时期,由于学校电子图书系统(EBS)存在安全漏洞,以及老师缺乏安全意识,导致其可以访问学校整个计算机网络,并获取所有测验答案。 该听众利用其技术优势,帮助老师解决EBS使用问题,并获得了学校计算机网络的完全访问权限。随后,其发现EBS系统中的测验答案存储在未加密的文本文件中,并利用该漏洞获取了所有测验答案,帮助自己和同学取得了高分。 该事件反映出学校计算机系统安全措施的不足,以及老师在信息安全方面的知识缺乏。

Deep Dive

Key Insights

How did the caller in Australia manage to get free internet for three years?

The caller discovered that a major Australian internet provider ships modems with default SSIDs and passwords. The default password is always an 8-digit number. By capturing a Wi-Fi handshake through sniffing or a deauth attack, converting it to a format readable by Hashcat, and using the program to brute-force the password, the caller could access free internet anywhere in Australia.

What is the significance of the default password structure used by the Australian internet provider?

The default password structure is significant because it is always an 8-digit number with no characters, symbols, or uppercase letters. This simplicity makes it easier to brute-force using tools like Hashcat, which can process millions of password combinations in minutes.

What was the Canadian caller's method for exploiting a grocery store's loyalty points system?

The Canadian caller exploited a grocery store's loyalty points system by submitting multiple online complaints for missing points, which equated to $10 increments. Initially, the system lacked a captcha, allowing the caller to spam claims overnight. Later, the system changed to auto-approve claims under $10 if the account had spent $10. The caller then created multiple accounts and linked them to cycle the $10 claims, effectively creating an unlimited money glitch.

How much money did the Canadian caller accumulate through the loyalty points exploit?

The Canadian caller accumulated just under $10,000 Canadian in one year by exploiting the loyalty points system, completing 996 transactions in the process.

What security flaw did the caller discover in the PeopleSpy app?

The caller discovered that the PeopleSpy app stored metadata, including social security numbers, in plain text files on the device. This allowed anyone with access to the device to view sensitive personal information without any encryption or protection.

What did the high school student exploit in the EBS program at his school?

The high school student exploited the EBS program by gaining access to the teacher's login credentials, which provided unrestricted access to the school's computer network. He discovered that all quiz questions and answers were stored in unencrypted text files, allowing him to download the software and access all the answers, which he then shared with his classmates.

Chapters
An Australian caller shares a method of obtaining free internet by exploiting default credentials on a popular internet provider's modems. They describe using a deauth attack and Hashcat to crack the default passwords.
  • Exploiting default modem credentials for free internet access in Australia
  • Using deauth attack and Hashcat to crack default passwords
  • Prevalence of vulnerable modems from a major Australian ISP

Shownotes Transcript

Let's get festive with it. Calls concerning grocery point systems, Australian internet providers, and so much more. Want to share your story? Check out hotlinehacked.com.)

Hotline Hacked is brought to you by DeleteMe. Take control of your data and keep your private life private by signing up for DeleteMe. Now at a special discount for our listeners: Today get 20% off your DeleteMe plan when you go to joindeleteme.com/HACKED and use promo code **HACKED **at checkout. 

Learn more about your ad choices. Visit podcastchoices.com/adchoices)