
Ep 33: RockYou
Darknet Diaries
Blog Posts About Hacks
Tom was on a terror finding web sight after web siht vulnerable to sequel injection, and hacking it down. He saw user names, hashed, passwords and email dresses of every user on the site. This included their logging name, email and password hash. But where's a safe place to post about hacks? Word press and blogger sometimes took down illegal contents so that wasn't going to work. So we gave b words a try.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.