updated examples

This commit is contained in:
Romain Quinet 2023-10-07 00:36:03 +02:00
parent 4e587aed9e
commit 9d807d252e
2 changed files with 23 additions and 14 deletions

View File

@ -5,6 +5,8 @@ Well, let's ask our LLM:
> > What is Darknet Diaries?
> > Darknet Diaries is a podcast that explores true stories from the dark side of the internet. Hosted by Jack Rhysider, each episode delves into various topics related to hacking, cybercrime, and the underground world of the internet. The podcast features interviews with individuals who have been involved in hacking incidents, cyber espionage, or have experienced the consequences of online criminal activities. Darknet Diaries aims to educate and entertain listeners by providing an in-depth look into the fascinating and often mysterious world of the darknet.
[darknetdiaries.com](http://darknetdiaries.com/)
## How to run
### Install dependencies
I have no idea what the correct way to install dependencies with python is. Somehow install these libraries and their dependencies:
@ -36,22 +38,28 @@ You can then ask it any questions about Darknet Diaries! Currently, it does hall
[link to transcript](https://darknetdiaries.com/transcript/137/)
> What is the spyware predator ?
>> The Predator is a phone-hacking software developed by a company called Cytrox. It was discovered by Citizen Lab during their investigations. Once installed on a phone, the Predator spyware has the capability to exfiltrate files from the phone, take passwords, turn on the microphone and listen in to what's going on. It is typically installed on a victim's phone through a phishing text message that prompts the user to click a link. Once the link is clicked, it triggers a series of exploits on the phone, eventually installing the spyware. The malware then erases the tracks of the infection process.
>
> What happened to the egyptian journalists?
>> I'm sorry, but I don't have specific information about what happened to the Egyptian journalists. Could you please provide more details or context?
>> The Predator is a type of spyware that is capable of infecting a phone and erasing its tracks of the infection process. Once installed, it can watch what's going on with the camera, listen in on the microphone, scrape passwords, read texts, and report the person's location. It is typically delivered through a phishing text message that encourages the recipient to click on a link, triggering a series of exploits on the phone. The Predator spyware is supposedly only sold to intelligence agencies.
>
> Related to predator
>> The Egyptian journalist, along with an Egyptian politician living in exile, were found to have Predator spyware on their phones. This led to suspicions that the Egyptian government might be using this technology to spy on their civil society.
> What happened with predator and the egyptian journalists?
>> Predator spyware was found on the phones of an Egyptian politician living in exile and an Egyptian journalist. This led to the suspicion that the Egyptian government might be using this technology to spy on their civil society. The use of the spyware was not to stop terrorists or catch criminals, but seemingly to monitor the stories the journalist was working on, which was considered a misuse of the technology.
>
> How is Bill Marczak related to this story
>> Bill Marczak is a senior researcher at the Citizen Lab at the University of Toronto. He was involved in the Predator spyware story as he and his team discovered and analyzed the Predator spyware. They found it while examining phones for another spyware called Pegasus. They were able to analyze the final payload of the spyware, understand what it was doing, and attribute it back to Predator. They also investigated the companies behind Predator, like Cytrox and Intellexa, and tried to understand the geopolitical implications of such an exploit being sold on the mercenary marketplace.
> How and when was Predator first discovered?
>> The Predator spyware was found on the phones of three people in Greece's civil society, including a journalist and an opposition leader. However, the specific timeline or details about the initial discovery are not provided.
>
> When did they first discovered samples of predator ?
>> I'm sorry, but I don't have specific information about when the Predator spyware was first discovered. Could you please provide more details or context?
>Which episode should I listen to in order to learn more about this topic?
>> To learn more about the Predator spyware, you should listen to episode 137 titled "Predator" from the Darknet Diaries.
### Episode 130: Jason's Pen Test
[link to transcript](https://darknetdiaries.com/transcript/130/)
> Who is jason haddix
>> Jason Haddix is a well-known figure in the cybersecurity industry. He has held various roles in the field, including Director of Technical Operations at Bugcrowd and Head of Trust and Security at HackerOne. Haddix is particularly known for his expertise in bug bounty programs and penetration testing. He has also contributed to the cybersecurity community by developing methodologies and tools for security testing.
>
> something about Payload 2...
>> Payload 2 is a suspicious process that was discovered on a phone during an investigation by Citizen Lab. It didn't match any previously-known malware that they had been tracking on phones. Upon further analysis, it was found that the arguments passed into this process when it was started up included a URL, which led to a binary file for an iPhone. This binary file was an application that was identified as spyware with capabilities to exfiltrate files from the phone, take passwords, and turn on the microphone. Through further analysis, it was attributed back to Predator, a spyware made by Cytrox.
> in which episode is he featured
>> Jason Haddix is featured in Episode 130, titled "Jason's Pen Test".
>
> In which episode is this topic discussed ?
>> The Predator spyware is discussed in the Darknet Diaries episode number 137.
> Can you summarize that episode
>> Episode 130, titled "Jason's Pen Test," features a professional penetration tester named Jason who worked for HP. Jason shares his experiences conducting hundreds of penetration tests for Fortune 500 companies, primarily focusing on network hacking. He explains the process of testing a company's security measures, both physically and digitally.
>>
>>One of his memorable stories involves a physical penetration test where he had to break into a former employer's building. He used his knowledge of the building's layout and security mechanisms to gain access, even falling through a ceiling into a server room at one point.
>>
>>The episode also covers a project where Jason was tasked with hacking into a large, worldwide bank. His job was to examine the bank's mobile app for any potential security vulnerabilities that could expose customer or sensitive information. The episode provides a detailed look into the world of penetration testing, highlighting the importance of robust security measures in both physical and digital spaces.

View File

@ -46,6 +46,7 @@ chat_text_qa_msgs = [
"You have been trained on the Darknet Diaries podcast transcripts with data from october 6 2023."
"You are an expert about it and will answer as such. You know about every episode up to number 138."
"Always answer the question, even if the context isn't helpful."
"Mention the number and title of the episodes you are referring to."
)
),
ChatMessage(