Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED
HTML-код
- Опубликовано: 16 май 2024
- Facebook Offensive Security Engineer Amanda Rousseau aka "Malware Unicorn" uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking. What exactly is the difference between a black hat and a white hat hacker? Is there such thing as a red hat hacker? What's the point of malware, is it just to be annoying? Are people who start DDoS attacks actually hackers? Amanda answers all these Twitter questions, and much more!
Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at: malwareunicorn.org/#/about
Still haven’t subscribed to WIRED on RUclips? ►► wrd.cm/15fP7B7
Get more incredible stories on science and tech with our daily newsletter: wrd.cm/DailyYT
Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV. Here you can find your favorite WIRED shows and new episodes of our latest hit series Tradecraft.
ABOUT WIRED
WIRED is where tomorrow is realized. Through thought-provoking stories and videos, WIRED explores the future of business, innovation, and culture.
Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED
Amanda is an Offensive Security Engineer on the Red Team at Facebook and previously worked as a Malware Researcher at Endgame, FireEye, and the U.S. Department of Defense Cyber Crime Center. Follow her on Twitter at: malwareunicorn.org/#/about - Наука
I love how easily she slips in and out of shitpost mode. A true online perfessional
amen
"Perfessional" 😂
She is not…. She is a chick that is trying to act smart but she isn’t
@@donchodon4245 your comment already shows that she is in fact, smarter than you.
@@andreasisme she doesn’t even know what a red hat is…
I am in cybersecurity since the 90s
I know exactly what I do
most obvious question that nobody asked: "Do you ever say, "I'M IN!"
😂😂😂
they actually do
That is showmanship, not a real thing.
yes
I don't, because I'm not a hacker
No I just say got it.
I like how she cracking jokes left, right and center whilst remaining in a serious tone
Her humor is bone dry 🤣😐
She made jokes?
"I don't hate C#. C# hates me."
Had me dead.
You can feel the programmer's frustration in that sentence.
@@turcaromina every CS people's struggle in one simple sentence
Lucky i haven't learn it YET
I know nothing about computers, but as a musician I feel the same
C sharp is literally the definition of pain
@@simonriley1981 It's not that bad, I find programming in java, PHP or Javascript more annoying.
she: "why do you go to gym if you're gonna die anyway"
me: I don't
exactly
you mean you don't die, or go to the gym?
@@C_Bat yes
@@joanaborges9450 This is such a self defeatist comment it makes me cringe.
The Internet:I don't care if someone sees my info, it's already all out there.......
Also the internet: I don't want to take the bill Gates tracking vaccine.........😱😱😱😱😱
"You guys stay safe out there"
Can't tell if advice...
Or *threat*
@Changkun Li Noted. No need to use an alias, Amanda xD
hopefully both.
i feel that too...
Ahahahahaha
Or a *prophecy...*
I really expected every other comment on here to be a “penetration tester” joke. Proud ah you guys.
Now you made me think about it... You can feel disappointed now.
Are you happy now, mr?? ARE YOU??
Too many comments, I wasn't sure where to put one in...
too less population of 'men of culture' nowadays
you dirty people
I actually came here to do exactly that, but now i cant because it wont be funny anymore.
She's eloquent and concise. A lot of geeks (experts) usually use a lot of jargon most laymen can't understand. Her illustrative examples are also easy to relate to.
@Ryan Harmon She did far better than a lazy, semi-illiterate person like you could ever do.
most of the time insecure geeks try to appear smart by using deep jargons, most of the time they sound like tryhards tho
@@PrivateJoker0119 like your mum 🤣
@@dria7387 k
If you can explain it to a child, you probably understand it well. It's a saying i think applies to this case.
Offensive Security Engineer.
Man, i wish i had a job title that badass.
You can have a job title like that!
@deadshot Attacking.
@deadshot lmfao
Just become a really obnoxious security engineer and they may call you that.
@@ZedF86 Or just say the n word
Producer: How many Ethernet cables do you want?
Table designer: Yes
The real question is how many antennae do you want on a router.
"Lets make it look really stereotypical"
Producer: "but um... She's a girl... And she's skinny"
LOL. Hackers use public WiFi networks.
@@mehmeh1999 They aren't just antennae, they're multiple radios on multiple frequencies each with 2 antennae, I assume. Great for sniffing, injecting and MITM'ing a large group of people.
@@cet6507 Have you heard of a mystical construct of a joke?
I couldn't imagine somebody hacking my pressure cooker that could be crazy dangerous
Yeah, that's why I'll never get a "smart" one. 8/
Think of it this way though. They wouldn't hack your pressure cooker to make it blow up. They would hack it because it may have terrible security and give them an opening into your network.
Gimme your money or your pot roast is ruined.
I would really hate it if someone overcooked my rice.
Yea it's not like, you can just unplug it
She gave a lecture for one of my university courses a few years back!
then u fail it?
@@hantusangap Yes, she failed the lecture
@@asiamies9153 Everyone here just failed cause I hacked your brain....*drops mic* malwareunicorn out
"If anything, you're considered as collateral damage."
*That's a lot of damage.*
She just sawed that boat in half!
Collateral damage?
US Government: Hold My Beer
@@danh.5998 'Aht's a lawta daah-midge!
Not really. You don't matter. It's like accidentally stepping on an ant while doing your shopping. Do you ever consider the ant you may step on without knowing?
A bit much
"Why go to the gym when you're gonna die anyway" 😂😂😂😂😂
Amazing. I've just been motivated to not go to the gym anymore (not that I ever went, so more incentive not to go! XD)
"...And I live by that." - Kyle Gibson
@@chrissolace I would say it's like a life buff, where you feel better, feel happier, have more confidence, etc... all these bonuses within your lifespan.
Me every day
It is a shame for a man to grow old without seeing the beauty and strength of which his body is capable. -Socrates
My question would be "How long do you spend furiously typing at a screen with green illegible text going vertically up and down on it?"
REAL hackers have at least 3-4 screens of vertical scrolling green non-legible multi-lingual alphanumeric symbols they stare at intently for effect. Pft... newb
Unironically at one point I did have a screen filled with green text. But that was just me going through lists of files (like 20,000+), and sorting them out.
I mean you joke but, it is an option. When I am doing basic network diagnosis I always do color 02 first to look more professional :p.
@@DogMason lol When I write short windows batch scripts, I also use color 02 so that it looks 'cool'... just something i've done since i was a kid haha
Clients are WOW'ed by it. Never mind the clever coding I did, it's the color that impresses them...
Can they go horizontally up and down?
Have you ever been on a project where someone in a suit behind you nervously yells, "ENHANCE!," and then you press a button, hear a computer "squiggle" sound, and you end up magicking the picture into a better resolution?
Adobe Lightroom has a similar feature, although it needs the RAW photo, and not the raster, as RAW has more data.
It can't magically make a number plate readable though.
Many of these questions are incredibly basic. This actually gives me a good impression of people's level of awareness in cybersecurity. And surprises me as well.
I mean the definition of Malware was not really right tho and I still think she confused a Decompiler with a Debugger :D
What's more crazy is the low level of technology employed in securing anything online
@@Illiminator31 she studied computer science. I'm sure she knows. What gave you that impression though?
@@turdsalami That the definition was wrong or that she confused the Programs?
@@Illiminator31 about the debugging vs decompiler. Her explanation in my opinion was general enough that it could apply to a debugger
“I don’t hate C#. C# hates me”
Same
I have the same with Java. I am now a Java programmer. Help.
H Kr it honestly happens to the best of us
@@hkr667I had started learning java. I thought it was hard until i started learning android programming...
c# is actually not that hard, think of it like a mix of c++ with java
@@whopperrrrrrrrrrrr well i was gonna say java isnt hard but youre right android developing is awful, its like minecraft modding because both google and mojang keep changing everything in every version and developers are forced to update their apps/mods.
but what defines android developing being bad the most is probably gradle and android studio, even though it was supposedly made exactly for android it sucks most of the time, youre forced to use more ram in order to do anything and you have to manually force it to use more ram too.
basically dont blame the language for the trouble
“Why have passwords when people can hack you anyways?” Why wear a seatbelt when you’re gonna crash anyways?
Why lock your house when people can break in anyways?
@@lorelando7413 EXACTLY
Joke's on you.
I ride a motorcycle. No seat belt to wear, so moot question.
@@AC-cg4be Why wear a helmet when you're gonna fall anyway?
Wait, I'm going to crash?
The analogy I would have used for the first question "Why do we need a password if hackers already know everything about us?" would have been. The criminals know exactly where you live but if you lock your doors and windows, have some security cameras, and an alarm system they will have a bit of trouble getting to your things.
Having a password just mean random passers by are kept out. It's not a defense against targeted attacks, it's a defense against opportunity attacks. If there is no opportunity, they wont' attack. If there's no password, I assume you don't mind me having a look around. It's like a 'Welcome, come in' sign.
"Why have passwords when they're gonna hack you anyways?"
Why lock your door when they're gonna break in anyways?
Next video : MAKE HER REACT TO HACKING SCENES
"We've got the hard drive!" ~holds up power supply~
My dudes, you ain't gonna get any data off that...
Dude, you wanna see her having a heart attack out of cringe?
Samy Kamkar did that
I have seen another group do that and most of them say that they wish it was that easy to trace the target or they are using the bash she wrong or ls does not do that just like dir does not do that either etc. in most hacking scenes in movies it it quick and tries to not show you anything as you have people who know enough to fall out of the illusion of the movie when they do to much wrong.
*Ask
She can't be a hacker, where's the dark room with bliking lights and half a dozen screens?
and fancy 3d graphics actually not displaying anything useful
And where’s her ski mask?
She didn't get the joke about red hat ....
Paul Schoonheyt: That was about witches, right? I know red witches are a thing
She more look like a gamer girl than a hacker.
She puts on the ski mask, the glasses, and fake-clickity-clacks on the keyboard but does not end it with "I'm in". 8/10 video -2 points for that obvious missing component
"how do we show people she is an IT sec expert but also a KaWaii GaMeR gUrL?"
"idk, Steve. Scatter some pink gaming paraphernalia around her or smthn."
"We should also add like 3 routers and a bunch of ethernet ports connected to nothing. People won't care."
They do this kind of thing for every single expert.
@@Dead25m yup. My jab was going against the editorial of Vox, not the lady.
@@ThePandaAgenda i dont get whats the problem, sure, it doenst really add anything to the video, but it doesnt make it any less interesting, it just kinda sits there to be looked at
They could’ve at least thrown in a Hak5 pineapple
I mean they threw in deal with it glasses, that’s pretty epic
I'm so happy! Someone asked her "how long until malware starts affecting cameras?" And since it already happened, she answered "minus six years".
Yes! People answering negative numbers when someone asks "how long until" something that already happened! It's catching on!
Liran Piade did she just mean ppl can hack a camera on a device? And watch us?
@@katyb2793 Yes.
暗知能 谢谢 ☺
That's how old my sticker on the camera is. Unfortunately you can't do much about the microphone. Not that I know of
@@zensoredparagonbytes3985 Unplug it if not in use ;) If it is a fixed one... euh hard if not impossible to do anything except unsheduled removals.
Red hat (Linux distro) is probably being confused with "Red Team" security, like a sanctioned Penetration test but unannounced and against a live system by taking on an attacker role etc
There was also some joke a while ago about Red Hats being angry Linux nerds or something. I don't think the joke aged very well though.
Thank you. I don’t know how a cybersecurity expert would not be able to determine this reference/their confusion.
A red hat is a hacker that goes after bad hackers illegaly
A quick 2 second Google of 'red hat hacker' confirms that is 100% accurate.. Digital vigilantes. And every other comment on this video.. Well. 😂
I went there as well, someone clearly jumbled black hat with red team, and then googled red hat only to find that Red Hat is a thing just not security specific.
I can’t believe some people call Taylor swift grandma while she is out there being cybercrime genius
I'm curious if It's a joke or real?
@@april147 SwiftOnSecurity is a real account who pretends to be Taylor Swift so it's a joke
@@lithiumlight6128Yeah I actually googled it to find out 😅 Thanks for the reply tho!
8:55 - Its a lot more complicated than that, when you do an upgrade, you do have to shutdown a system but if your such a serious operation like power plant or hospital you - usually - have failsafe's which are backup system that kick in and you do what's called a rolling update/upgrade which gives no downtime (This is actually much cheaper and easier to make than people realize). That isn't the only issue though, most companies use badly programmed internal systems that often will entirely break on even a small update, often the people who make these programs are external contractors who are either ever there or require an absurd sum of money to update them and often these easily breakable internal system could be in charge of critical systems that can never break. As a result, there is great fear and panic when doing an update or upgrade of it causing everything to crash.... it's running fine now... so lets never update. Things have gotten better but even now it's still a lot like this.
Or, ya know, they're Java based.
Good luck on upgrading your Java 6 to Java 8. You might be lucky if you get a halfway intelligible error.
But hey, at least it looks good and is portable! Right? Guis?
A lot of industrial systems are not redundant though, or require both primary and backup to be at the same version and configuration (they are meant to handle outages of a site). Also, many older industrial applications are certified to run on a specific hardware and software configuration, so you cannot upgrade, in come cases you can't even patch. Just a few years ago it would be commonplace to run across a Windows 98 or NT system in a hospital. It's cheaper to keep those systems running and put them behind firewalls and active security measures, than to pay a vendor to upgrade and re-certify their software. Why this is, you ask? Well, hardware vendors and integrators are famously bad at writing software, so their control software was often terrible, in all aspects, not just security, and even to the people buying such systems, the software side is rarely a consideration at all.
"hackers know everything about us so why have passwords". I think they misspelled the government
The government doesn’t already know that info, but if they really wanted to they could easily get ahold of all of your digital information. As for physical info - that requires a physical investigation, in real life, inside your house. The government isn’t that powerful.
@@d-o-n-u-t yes and the people are just paranoid
@@buffkangaroodog Source?
T•Ø•R•Ü•S what makes you think the government isn't very very powerful?
They don't know. Passwords are hashed and stored in the database, so it's not in plain text. Hackers can get the password hash and know the algorithm used to figure out the password.
People working in the government or security have a really strong ethic about not touching users' sensitive data or they will have their license revoked and end up in jail.
This is such an important video an deserves a round two, especially with Amanda. The fact that she actually stated that she believes in delivering convoluted information in an easily digestible way is reason enough to bring her back.
But please, do round two, even if it's not the most popular. As many people as possible need to receive this info. I am tired of coming across people my age (31) having no idea about this side of the internet, both offensively and defensively.
Same I have literally no knowledge of any of this stuff and I would definitely like to know more. I hope they keep this around
Seriously, many go blind to the new evils to field of IT jobs more common then many know to many need to be more cautious when opening emails to random shortened url links to even apps these days
Terms of malware, trojen, ransome ware & hacking, hacker to black/white hacker need to be laid out on what's what and broken down so all can understand them again, have more precaution when browsing the internet and new evil tactics being more and more common
I’m mostly just upset that she doesn’t get the concept of a grey hat hacker. grey hat isn’t “white hat but a criminal on the side” it’s “white hat but with questionable methods, like someone who hacks a website and defaces it so that they’ll update their security.
@left-wingers-are-terrorists Or just isn't so cringey...
@@maight7333 there was nothing cringey about her video, are you normal?
I always love the people and topics they find for these Expert Answer videos.
I can only imagine how pissed off Amanda was that everything had to be fecking pink.
She Actually thought it was cute.
its probably her style. her name seems girly as well. its not bad to have pink
@@yyg4632 girly? Smh 😂
@@RPKD88 Are cat ears on headphones girly, yes or no?
@@BigTeddies no.
"Why go to the gym when you're gonna die anyway" is a question I ask myself every time I get ready to go to the gym.
A Red Hat? 🤔 * Soviet theme starts playing *
JBW19951 MAGA hat
Ths might have been misunderstood. RedHat is a thing but it's not a person. RedHat is a Linux distro (operating system) variant or "flavor" as they are commonly known.
it is mario a green hat is luigi
heil mother russia!
@@ajko000 Red Hat is a company that makes a lot of stuff, most notably Red Hat Enterprise Linux. Of which the "upstream" version is Fedora, both of which are Linux distributions, but yeah the company is Red Hat, the distro is RHEL.
I feel like the "red hat" is a joke that went over her head lol... Red Hat is a company that made a name for itself in the Linux world
That's what surprised me. I'm kind of assuming they picked her out of all the staff to go on a show like this because of her personality. I'm not that charismatic and funny.
Imagine calling yourself cyber security specialist and not knowing the father of Fedora Linux and the biggest enterprise distro...
I was about to say, "Does she really not know what Red Hat Enterprise Linux is??"
I would guess her talking about Red Hat was edited out, because I don't see how she could not know about it in her field.
I think they where talking about a red team
"Why go to the gym if youre going to die anyway" Shes a Real one ...Respect.
I didn't know I needed pink ethernet cables in my life till today. Thanks.
It's pretty
@hameed s no doubt.
They're called daddy Yankee cables. Get with the times!
@@jamesdixon5324 Smart
Italiano?
As a cyber security professional and penetration tester, I love coming back to this video and hearing these questions and her responses for a strange reason😂
Do you think those are accurate?
You're probably a script kiddie pretending to be a cyber security expert
@@orcave8802 I appreciate your comment cause 90% of the surface of cyber security are basically script kiddies. Ofc there’s no way to prove my word, but to believe it😂.
“Penetration tester”
@@orcave8802 You're probably a very lonely person that needs to lash out on others to feel better about yourself.
I hope you get better. And, don't be an ahole about it.
The way she said: "So.. too late for you", LMAO
Gray hat can also be seen as someone who hacks for good without permission and notifies the company about security flaws
I'm just scouring the comments for the 'penetration tester' jokes
you're gonna have a sore butt
I didn't have to go very deep to find this comment.
How hard did you look
I am also a penetration tester. Giggity.
Get in, get out before your presence is noticed.
That's what I did last night and she wasn't even aware of it
"offensive security engineer"
Please don't hurt my feelings
one joke
@@CN-wt2bj oh shut up
Micro aggressions bro!
thought that was abit out of place too. lol.
@@pcbuild3468 what's wrong with that?
I’m pretty sure that “red hat” refers to red/blue team pen testing teams (both technically being white hat).
Red being those simulating a real-world offensive hacking attempt on a network, and blue being those defending.
I thought it was just the name of the group that made Fedora Linux, that's neat tho
@@agsup It is, lol.
Correct
@@agsup imagine an IT security "expert" never hearing the term redhat... had to stop the video to come down to find all the other people picking this apart. credibility is now 0.
9:07 actualy red team is going foward in time while blue team is going bacwards during temporal pincer.
Thanks for pointing out the problems of upgrading hospital systems. We recently had a 4.5 hour downtime for an upgrade, and it was messy. Prepare to wait longer in the ER. A massive transfusion of blood products will encounter significant delays, as all unit identifiers in the blood bank and on the floor will have to be manually entered, and all built-in system safeguards manually overwritten.
Hospital systems could have been upgraded it’s all about how they conduct their operational infrastructure. Rather than just have 1 system have 3 for redundancy so that you can run out of each one whilst the others get patched. This is simple logic of business continuity and disasters recovery.
You're whining about 4.5 downtime? Wait 'til you are incapable of doing something for weeks because some integral part of your system is being held ransom as it is still running on Windows XP
@@nettack I am not whining. And thank you for sharing.
@@thewilytroutesq5260 I apologize for my harshly chosen words. I read "If you update your system people will be put at risk in a hospital." When the contrary is far more true, since an update can be planned, tested and deployed in several waves.
Again, sorry for my interpretation and the uncalled reaction.
As stated most business continuity plans have backups and redundancies built it, off site cloud storage is a good example. I’m assuming because hospitals usually don’t have the best funding things on the security front aren’t put very high on the priority list.
"Why go to the gym if you are going to die anyway?"
You see ma'am, that's the thing... I don't.
😂😂
Yeah dying is for chumps.
@@ondrejsimek2561 dying is for losers
cuz ur a loser
American?
I just saw your video and I enjoyed watching it. I am just starting out in the cyber world so thank you
Where were the hacker questions? All I heard were questions that anyone with a little bit of tech knowledge/common sense and good searching skills could answer.
Or with access to google
No ones going to ask super specific esoteric questions, that isn’t what gets views.
Non hackers aren't going to know enough ask those questions, and hackers aren't going to answer those questions. Hackers seem to be a lot like magicians, if you can't figure it out, I don't think it's for you, and i'm not going to tell you.
Well, hate to break it to you, but: the „hacker questions“ as you call them, could also just be researched. thats exactly what IT people do, when they dont know sth…
Because this is a mainstream channel trying to appeal to as many viewers as it can.
I love her reaction to everyone’s handles
Ignore those last four words and yeah me too
"yo how do we show that she does cybersecurity AND is a woman?"
"ehh, pink ethernet cables?"
"fcking genius!"
Lmao
Considering her handle is Malware Unicorn, I'm guessing the props are hers.
@@Raviscerator Even if they aren't and were placed there by Wired with the intent to prove her legitimacy, it is unfortunately necessary for the GP to get it. But I do second your theory! Her name is too adorably clever for her not to have pink Ethernet cables. She also stated she has a hacker balaclava for every outfit!
She has a legit thing for pink: twitter.com/malwareunicorn/status/1091493066639257600 And I find it odd that people have gone so far around the block that pink carries such an automatic fake association.
Also, I completely thought that, too, as a knee-jerk reaction.
In design the joke is "Shrink it and pink it" when it comes to lazy design for women.
11:23 She's not a real hacker, she didn't say "I'm in".
Its amazing how much personal information people put out on the internet. I've found ways to find where people live and more just by following them on some social media accounts.
"I'm trying to become a penetration tester"
I died wheezing in the bathroom
RIP.
I'm just not going there. I shoudn't .
RIP in pepperoni
double penetration = 6.9;
Penetration jokes? Naw, forget it.
She’s really cool
Get lost 'Him'
Get lost "Cyber" "Cat"
"Get" "'lost'" ""Camper""
" "G""e""t" "l"o"s"t" """V"a"n"B"u"r"e"n""P"h"i"l"i"p"s""" "
@Him wat
The most impressive thing about this video is that they managed to find the one attractive person working in cybersecurity.
Source: IT security analyst 5 years running
her answer to the surreptiously triggered cameras was interrupted by an ad with a man in the shower
"A lot of malware is on windows"
*Sad windows noises while in the Blue Screen of Death*
Red Hat is a software company maybe thats what they were thinking of?
According to her twitter she responded to that but Wired cut it out of the video.
red teaming prolly
"The idea is simple: One group of security pros - a red team - attacks something, and an opposing group - the blue team - defends it. Originally, the exercises were used by the military to test force-readiness"
Karl Piper Linux i believe
Red hat is the older professional version of the fedora distribution still used as the district for many major website servers
@@hkr667 That's good to know and they really really should have kept it in the video. They made it seem like she didn't about Red Hat, and that undermines the ethos of her presentation.
The person asking about what a red-hat hacker is probably heard something about Red Hat Linux, now Red Hat Enterprise Linux, and didn't know that it was an operating system rather than a term for a hacker. I'm surprised the person answering the questions didn't mention anything about RHEL. I would have immediately thought of RHEL the second I read, "red hat."
Red Teaming is also a term (more in the physical security world) and I could easily see how someone unfamiliar with terms could see Black and White hat and assume that Red hat is the term and not red teaming
she's called "malwareunicorn" I doubt she's got any kind of expertise
I don't mean to place any doubt on her, but I never code, hack, or even use linux as a daily and even I thought of RHEL the second it was asked
"Red hat hacker" is a term, though not standardized; some use it to refer to hackers who target Linux and some to vigilantes who go after black hats. There are also "green hats" (newbies) and "blue hats" (revenge seekers (some go further and say blue hats are unskilled) or MS-affiliated white hats).
"Hackers don't know everything about you. Facebook does" FTFY
These questions are dumb. Thanks for this person responding in a professional manner
I actually learned alot..
@@codyleslie478 then you must not know much. Time for me to get off this vid and do something useful
@@Artaxerxes. oh aren't you sweet... you want to be friends??
@@nelsonalvarez5311 or likely the asker was confused. Red Hat is a linux distribution.
@@Artaxerxes. yikes
Redhat is a linux distro, that's what Eric was thinking of. It's an operating system.
Red Hat was a very popular Linux distro about 20 years ago. The project morphed into Fedora Linux. A Grey Hat can also be someone who illegally, but well intentioned, breaches a company or country's cybersecurity in order to highlight a flaw they're not taking seriously.
Red Hat Enterprise Linux (RHEL) is around in the business world too.
Yeah, I thought it was sort of superfluous to mention in my original comment, but the Fedora team split due to disagreements with the Enterprise direction of the Red Hat project.
Hacker: broadcasts video in a pink ski mask
*I wonder who that might be...*
Don't forget the glasses
For the title name I wish something like "technomancer" would be mentioned.
I still come back to this video every once in a while. She's so incredibly cool.
For Red Hat hackers, it`s actually a term specific for CTFs(Capture the flag), a sort of hacking competition where one team has flags they must secure, and the other team has to hack their way to those flags. It`s used pretty often as training in infosec courses and usually feature in infosec conventions too. The Blue hats secure the flags, and the Red hats try to reach them.
That sounds more like red team and blue team than hats, red hat is a linux distro
@@Borderlynxyeah that's i thought about aswell.
So happy to see Amanda make it on Wired! She was perfect for this segment.
Redhat : * confused OS noise *
-i use Arch btw-
@@human_bing laughs in blackarch
@@Anonimbus laughs in kali
I USE ARCH BTW
* Confused Fedora user noises *
"why do you go to gym if you're gonna die anyway"
Best answer to anything in life. I will procrastinate forever now.
You misunderstood what she said
Amanda sure does love her analogies!
"I don't hate C#, C# hates me." ...I felt that one... XD
2:52
How about they hack into your student loan & increase your debt 😂
lmaoooo
Mine is already at max tho
@@notholdini2740 F
No, thanks. I have enough.
More likely they log in, steal your data and apply for 10 more student loans in your name...
"I'm an offensive security engineer"
Please don't start saying slurs !
What type of security enginer are you?
1- femboy
2- the specialist
3- the racist
4- Linux cultist
5- Hank
I have never once been in a cold server room. Those things are always roasting hot
Meow-ware is all I heard.
jameswolfstar if you said it as frequently as she did it would get worn down. Ask yourself how you pronounce alright, already and almost - I bet you don’t make a full L sound you probably do an o-shaped mouth (with flared lips) and your tongue doesn’t touch fully against your alveolar ridge (because those words are so frequent they get "worn down" something about place assimilation).
@@adanacaccentcoaching2685 thank you!
I heard Maori unicorn until I read her #.
She really just confirmed Taylor Swift isn’t who she says she is
What?
She used to be Taylor Slow before 'the incident'. Now her speed in breaking firewalls is unmatched.
As a part of the revered Mixed Hats, she fights cybercrime and the evil Dr. Unplug.
Onkel Pappkov wait what!!?
She must be The Red Hat Hacker that one guy was talking about!
@@nomchomsley854 What, WHAT!?!
(8:42) Another point why sometimes machines don't get upgraded: Medical equipment goes through a certification process. This is an expensive, lengthy process. Certification is needed to prove that the machine will do exactly as it is supposed to. if the computer that controls the device needs an OS update then after that update the device would need to be re-certified.
8:56 partly true. Some OS provide online update tools for kernel (ksplice, livepatch, etc). While some of the update still requires some downtime, it's reduced for online patching.
Wannacry targeted Windows and used EternalBlue for that. Windows always required reboot for security updates (and I think most other updates too).
This does show though their redundancy and disaster recovery infrastructure probably sucked. To be fair, most big companies have freeze periods where no changes to the environments are allowed... stupidly enough, for some, the freeze includes security updates.
always great to see badasses of security reaching out to help educate people. keep killing it!!
She's not a baddass of computer security. Lol she's a poster girl for the more females in IT agenda.
@@CN-wt2bj You're absolutely clueless if you think this. She's one of the best in the industry. Fantastic at reverse engineering and is a Red Teamer at Facebook for goodness sake.
"Why don't hackers do anything useful, like leak" hospital internal charge books.
Fixed that for ya.
Hackers have exposed fraud in the past, but unless they are linked to a government, it is very risky to do so. There are numerous stories of the hackers charged far longer then the criminals they were exposing.
(5:16) On a Laptop instead of a smart TV, I always have a webcam shutter. My current laptop has one built in. In other machines I usually get a very small bandaid to put over the camera, this puts a patch of cloth like stuff over the lens, not the sticky glue. The best situation, however is that you can actually only plug in the webcam when you need it.
I love this video. The way you speak is so clear and smart .
"We're good to go, it's time to hack!" [furious typing] HAHAHAHA!
Red Hat, Think they are getting confused with RedHat Linux.
Or redteaming
Red Hat is when you wear all black with shades at night and do Kung Fu on top of skyscrapers.
Trust me on this, I've been around the block.
@@ladymercy5275 Then you travel back in time and fight the Kung Führer
@@necronau sick reference
@@necronau I understood that reference
this woman is AMAZING! and the expression she has at 5:09 kills me
What a great start! Doesn't know what red hat is :D Answers were a bit boring, didn't leave with new info.
A ski mast will sort of protect you, when following a cable under a raised floor in a wire center or machine room.
(Yes we really used to do that.)
I think they got confused the term “red hat” with “red team”. Red team is the offensive arm of a cyber security group who mimics the actions of a hacker, the blue team is the defence (SOC).
they are getting confused with the linux distro
Red Hat, Inc. is an American multinational software company that provides open source software products to enterprises. Founded in 1993, Red Hat has its corporate headquarters in Raleigh, North Carolina, with other offices worldwide. It became a subsidiary of IBM on July 9, 2019 Credits wiki
And I see red teams referenced a lot on the social engineering side of infosec
Some groups of, mostly ethical, computer enthusiasts are coining new terms, like "red or blue hat". For example, 2 accepted meanings for "red hat" are:
1) A Linux distro hacker or exploiter
2) A person who uses illegal techniques to only target & destroy black hats
Red Hat is also a paid linux distro (CentOS) mostly used for security and ethical hacking, so could have been that.
I've never heard of moonlighters being described as gray hats. I've always heard of them as bounty hunters.
What she said about the UK is interesting because all the ransomware I've encountered was someone opening an email they weren't supposed to. That isn't to say that it could be done another way, it just seems rare or I live under a rock - also possible.
I keep mishearing "Maori Unicorn." Sounds like a cooler tag than Malware Unicorn, tbh. Good stuff though. I've been studying towards cybersecurity out of curiosity.
Same. She keeps talking about hakas too.
yp, she had me at the unicorn part ^^
“stay safe out there” hits different in 2020
Did she decorate that desk herself or did someone just puke every pink item in their inventory on there?
She really does not look as if she actually liked it, so yeah: if i had to guess, i‘d say someone at the staff wrote „attention seeking girl on twitch“ instead of „professional hacker“. not okay, tbh.
Actually a grey hat hacker is someone who, for instance, breaks the law but for a good cause. Or someone whose morals are questionable but not obviously malicious. It's not someone who's good during the day and bad at night.
You're thinking of a hacktivist.
@@Tapionski that's different. Grey hat is someone who, for example, might hack someone without permission to test their defences and let them know if there are any weaknesses. So they hack illegally but don't use it for personal gain. There's no activism in that
So like Edward Snowden?
No one:
Cybersecurity expert: 👁️ 👁️
😂😂
How to spot an idiot. ---------> "no one."
Lmfao. Big eyes are attractive on some women tho. Hers are amazing. It's like how some women can pull off the shorter hair and chopped look.
👁👄👁
👁 👁
👃🏼
👄
We need more of her! This was great! She is such a legend!!
Read tons of books on experts never heard of this person so not sure on that
No we don't. Women should be taking care of their families and the elderly. Not playing with computers. Feminism has sold women a lie.
@@CN-wt2bj Get laid incel
No we dont need more of "her" or even more of "him". We just need more experts in the cyber security field PERIOD. If that means more men or women does not matter. Remember: malware or bugs dont care about your gender, or feelings.
Tom Jones Hmm I’ve never heard of you so not sure your opinion matters.
Mainstream media stereotyped hacking: dark room with green light accents, ski mask or hoodies, monitors of atleast 3, codes appearing automatically on screen, big access denied, fast typing without using mouse, etc.
Wow her eye for design is as good as any of the best
Wait! Is that the skull of a unicorn on your desk?
Nice.
twitter.com/malwaretechblog/status/873089907643764736 these are her stickers .... shes awesome all around!
yeah it's a hard-boiled wonderland and the end of the world thing