DEF CON 23: Confessions of a Professional Cyber Stalker - Ken Westin

แชร์
ฝัง
  • เผยแพร่เมื่อ 14 ธ.ค. 2024

ความคิดเห็น • 54

  • @yakushitamahacka4199
    @yakushitamahacka4199 9 ปีที่แล้ว +191

    Man i have seen other DefCon Lectures too and the guys were screaming from laughter even if something was not very funny!! This guy made some excellent jokes and no response....tough audience! :P
    Nice Presentation!!!

    • @lksw42439
      @lksw42439 8 ปีที่แล้ว +22

      that's cause this mostly appeals to feds, and they don't have any sense of humor

    • @yakushitamahacka4199
      @yakushitamahacka4199 8 ปีที่แล้ว +2

      Agent800 Hahaha maybe that's the case..

    • @yuekitsune7629
      @yuekitsune7629 8 ปีที่แล้ว +1

      very tough ·~·

    • @probablynot8154
      @probablynot8154 7 ปีที่แล้ว +9

      I thinks it's because you just can't hear the audience most of the time.

  • @HeavenifHell
    @HeavenifHell 9 ปีที่แล้ว +12

    Funny enough, one of the faces wasn't actually blurred.

  • @fudanchu8436
    @fudanchu8436 9 ปีที่แล้ว +15

    Clever use of GPS and cameras - which are really proliferating in electronics now.

  • @ericsbuds
    @ericsbuds 9 ปีที่แล้ว +42

    10 years in jail for guessing passwords and distributing pictures yikes. certainly should be illegal but damn... 10 years... he must have done other stuff too

    • @the3picshow40
      @the3picshow40 8 ปีที่แล้ว +19

      No, computer crimes is a harder punishment than for example rape or drug dealing :)

  • @mikeseitz1381
    @mikeseitz1381 8 ปีที่แล้ว +29

    Sooooo always wipe the hard drive after you steal a computer/cellphone?

    • @RafaelSouza-vk9km
      @RafaelSouza-vk9km 8 ปีที่แล้ว +5

      +Eric Norton you meant burn it? haha
      Because when you just wipe it, the data is still there, you just lose the pointers to them. What you can do is to overwrite all the data and then format again

    • @igrewold
      @igrewold 8 ปีที่แล้ว +5

      Some tracking software is embedded in the BIOS. Even if you format the device it will reinstall itself back onto the OS and report home. I had an Asus laptop that had this feature a long time ago. And once it gets turned on in the BIOS there was no way of turning it off even if you disabled it there!

    • @lksw42439
      @lksw42439 8 ปีที่แล้ว +1

      but what if it's got a hidden partition? or something in the firmware? I'd just use a new harddrive, and make sure to spoof your mac after you reinstall on a new HDD.

    • @zyxwvutsrqponmlkh
      @zyxwvutsrqponmlkh 7 ปีที่แล้ว +3

      and then change the serial numbers on every chip.

    • @zyxwvutsrqponmlkh
      @zyxwvutsrqponmlkh 7 ปีที่แล้ว +1

      Lets say I offer people a phone recovery service. People register there phones with me and upload the s/n of there device. I then sub-license with app developers to report back if any of there apps are running on a device with a s/n on a list I provide to them, they get a bounty for finding a device. Tell me how are is your wiping of the phone going to stop me?

  • @julienpiltant2416
    @julienpiltant2416 6 ปีที่แล้ว +2

    Nice guy, great conference.

  • @mosipd
    @mosipd 8 ปีที่แล้ว +28

    Man, he didn't even get a chuckle out of his jokes. It was a good talk otherwise though.

    • @probablynot8154
      @probablynot8154 7 ปีที่แล้ว +12

      He did, lots in fact. The audience is very quiet in the audio.

  • @Kelo60
    @Kelo60 7 ปีที่แล้ว +1

    I got involved with alot of dudes in my past who where crocks and would steal laptops. They paid me 10% of what it sold for to wipe the drives and install the OS. Needless to say they all ended up in jail and I got away with 20k for school. No joking was the easiest money I ever made. But now Im on the Up and Up and dont do black hat.

  • @shawn_li
    @shawn_li 7 ปีที่แล้ว +1

    how do u spy on someone?

  • @jackkraken3888
    @jackkraken3888 9 ปีที่แล้ว +2

    Very cool video, the idea that the exif info could be used to track down criminals is pure genius (geo-tagging aside of course) , I guess one question is if the exif info of photos on Facebook or Instagram for example have been indexed. This seems like a really great way to recover stolen items.
    If only every digital device that takes pictures stored serial numbers.

    • @nerdhabit6778
      @nerdhabit6778 8 ปีที่แล้ว +1

      Jack Kraken I would assume the compression would wipe the exif data. I could be wrong though. Definitely worth a try. He gave you the link to the tools.
      (Edited due to autocorrect fail)

    • @yannb1622
      @yannb1622 7 ปีที่แล้ว

      Nerd Habit exif is not wiped on Facebook as if you take a photo with geotagging (picture from a camera with gps activated), Facebook asks you to set the place where the photo has been taken, and it's always the right place where it was taken.

  • @LG-Devil
    @LG-Devil 8 ปีที่แล้ว +8

    Great example of hackers using their skills for good. In order to scrape the exif data from all flickr (or other source) does that means downloading all 4 billion images or can you scrape exif without downloading? What language did you program your scrape from php? Some older cameras do not have exif compatible metadata, what would you do in that case just call it a lost cause? Excellent presentation. Kind of sad that some hackers out there are more ethical than data mining/marketing companies. Great publicity for gadgettrak too, I'll remember the name. Congratulations.

  • @officergregorystevens5765
    @officergregorystevens5765 7 ปีที่แล้ว +1

    I have a prety simple idea for law enf.. how about equipping LEO agencies with laptops or other small devices , preferably capable of logging running say kali linux rolling or again, a similar distro specifically with kismet running, looking for with airodump-ng as well (logging with that too) the MAC address(es) of the stolen device(s).. think that might be helpful? At least to a degree.

  • @ManuelGutierrez-zb5xm
    @ManuelGutierrez-zb5xm 8 ปีที่แล้ว +17

    This guy is brilliant.

  • @jackle3002
    @jackle3002 5 ปีที่แล้ว

    what was the crazywall software he mentioned. Multigo? didnt find anything

  • @ACScomputerbuild
    @ACScomputerbuild 9 ปีที่แล้ว +4

    iss switched to linux in may

  • @vinnyvdalidemonet8527
    @vinnyvdalidemonet8527 7 ปีที่แล้ว

    Nice Job. That is work to be proud of Ken.

  • @compucar03
    @compucar03 9 ปีที่แล้ว

    How can I search the EXIF Database?

  • @peterellis4166
    @peterellis4166 7 ปีที่แล้ว +2

    That grin at the end lol, so proud of himself

  • @t1mmy13
    @t1mmy13 8 ปีที่แล้ว +1

    Took a while to get up to steam, but this is a great talk!

  • @marcusbogle5389
    @marcusbogle5389 8 ปีที่แล้ว +1

    has anyone download the tools

  • @passengerify
    @passengerify 5 ปีที่แล้ว +1

    Interesting...

  • @aronpop1447
    @aronpop1447 7 ปีที่แล้ว

    how in the fuck do you take a picture from a laptop's webcam that is not yours ?? HOW

  • @thespiffingamerican
    @thespiffingamerican 4 ปีที่แล้ว

    What an ending.

  • @kingti85
    @kingti85 8 ปีที่แล้ว +34

    A lot of these Def Con videos are really...meh.
    I likeded dis 1 a lotz

    • @lksw42439
      @lksw42439 8 ปีที่แล้ว +11

      it all depends what you are into...

  • @Some_Beach
    @Some_Beach 5 ปีที่แล้ว

    Blackhat had an ethics issue? I thought you had to have a 0day in your presentation to have a talk there

  • @jodelboy
    @jodelboy 8 ปีที่แล้ว

    THANKS!

  • @bjdooi
    @bjdooi 7 ปีที่แล้ว

    i already knew to be paranoid while online, now im fukn freaked, boogey data got all my shiet

  • @Tech_Traveler
    @Tech_Traveler 5 ปีที่แล้ว

    Good, I hate thieves!

  • @CallOfDutyMatrix
    @CallOfDutyMatrix 9 ปีที่แล้ว +1

    hi

    • @yossarian1633
      @yossarian1633 8 ปีที่แล้ว

      No!
      Imean, hello sir. gday 2u

  • @transkryption
    @transkryption 5 ปีที่แล้ว

    Cool

  • @cam615615
    @cam615615 9 ปีที่แล้ว

    k