the VM exploit should have been well over 10 mill reward. That is the most devastating vulnerability. the entire point of a VM is so that you'll be safe while bug testing. Imagine the consequences.
Actually they were developed for serverspace first (VMware vSpehere, Proxmox) to maximize processing power while reducing hardware overhead. Pretty nifty tech actually and then it found its well earned place in cybersecurity.
I'm currently studying Cybersecurity as a bachelor's program. I thank you Jack for the podcast as background for studies and when I do hacking challenges :)
@@Stopinvadingmyhardware probably a victim like myself, if someone wants in your system you can spend thousands trying to protect yourself... still had to format my rig.
Sounds like it... From my experience, the only way to protect yourself is to turn off your computer, unplug the battery, toss it into the trash, then live like the amish...
He brings very experienced people on, just to talk about surface level information you could find reading page 1 search engine results. This podcast would be so much better if he actually used the knowledge of the guests instead of just using them as a cool prop.
@@saygo-png Everyone is entitled to their own opinion but I’d disagree. I feel you can truly tell he’s passionate about what he does and that’s the most inspiring aspect of his videos. Even if one doesn’t care about the topics he seems to bring them to life and makes you interested in Cybersecurity. That’s why I like his videos so much. I’d rather listen to him bring on entertaining guests on his show and explain what they’re saying in layman terms than a uninteresting lecture on the same topic where I don’t fully grasp on what’s being discussed.
@@saygo-png if he wants it to work on RUclips, he has to make it comprehensible for the largest group of people. I wish there were more technical stuff too ...
@@Entropy67 Yeah, I think the main purpose is to feed people with leads so they can take terms to search engines, many may find this stuff interesting as a hobby and just be casual.
@@angtang01 and everyones at a different level of knowledge in their own path, so being as general as possible is best. I wish there was like an outtakes section or something where they could rant on more complex in-depth topics, but I'm not really complaining. These vidoes are already very entertaining.
Essentially they use their conference to "intern" out others hard work. They provide a "prize" but the attacks and all information gathered is prperty of the conference and it's owners. Therefore they can then turn around and sell the individual attackers hard work that took them months/years as security prevention information to the respective browser companies....
That virtual machine escape is scary, damn! I just had another weird experience of some dude sitting in front of our house in his car, leaving right before dawn when I got up to take care of our animals, he drove down the street, turned around, came back and snapped his head around to stare at me while driving back by. I was at the back door while this happened so how did he know where I was in order to whip his head around to stare right at me? He must have been watchung our kitchen window. It was definitely strange, seems like something more than stealing our wi fi. I don't do anything wrong so I don't get it. I haven't noticed this kind of thing happening in several years. Maybe it's because I started talking to someone again because they owe me money, who knows, just wanted to document this in a public place.
Wow, I really wanna join these guys but i don't really know where to start with reversing, idk, Firefox or something to find a vulnerability... I can barely understand my own programs reversed... compiler does some mysterious things. Or I need to learn more. 😥
I think they run decompilers that aren't perfect enough to recompile, but enough so to reverse engineer.. In this case to find working exploits. E. G MacBook air network exploit
With IT and OT industries, it's always about more and more learning is required. Which is one of the reasons I love the IT field. But if you're wanting/needing to decompile something ghidra will be your friend. Another tip. Osint osint osint. Research research research. It can be extremely mind meltingly boring at times but it's worth it when you find exactly what you're wanting/needing already made for you or at least poc'd at least a little.
@@rakdosrok5816 Thankfully I'm getting a degree in computer science in a cybersecurity stream, hopefully I get to learn more systematically from there to supplement all of my self taught stuff. It can get dizzying, the sheer number of stuff that there is to learn, not knowing where to start. I feel just being active in picking up on new stuff and learning the fundamentals and commonly used tools (and their principles ofc) over time is building up a knowledge base in my head that I can rely on in the future. Just feels like an infinite process lol
Of course some hackers can't travel for particular reasons, like in some countries having a criminal record will not let you have a passport (like the US) some aren't interested in the title etc Saying who's the best hacker is like saying which religion is real while standing in Jerusalem, I'm pretty sure someone is gonna argue with you
So these are some of the most expensive vulnerablities, too bad they can't submit the bug to a corporation via their dedicated BBPs. It's not a solution for the corporation. It's a solution for trend micro and they just happen to do good by providing information on vulnerabilities to the corporation it's going to affect. Corporation should still have a dedicated VDP and BBP along with continuous security testing via pen test depending on the corporations risk profile. Love your podcast brother.
Oh it's much easier to get onto some kind of list than you think. Just searching for osint topics or exploits will flag your internet traffic automatically by the nsa and homeland, and if you gain enough flags then you get noted down as potential danger or as a possible asset. Nuclear topics are the easiest way to get onto a list, especially if you start learning out to build things...
It’s 11pm 🕚 on a hot rainy night in Chicago & I’m just 👀in’ for a story… long day = short attention span if ya know what I mean! Tried of death & distraction, who’s that kid… hacker dude, darknet that’s the one… my old time Radio 📻 of the 20th century replacement & eventually improvement… you’ve finally found a murder less mystery !🎉 & Much appreciated all around! Thanks 🙏
No click exploits like that are exactly why. Security researchers don't even use a traditional operating system. They typically use something like cubes OS, which is hyper compartmentized And I can understand why people might not want to go that far, but you also can't just use a regular VM either. Because you actually need to get a hardened VM that has the proper security measures and the proper shit in place Because here's something else that might blow a couple people's minds. A virtual machine usually is not a security tool. It's a compatibility tool. So, the vast majority of virtual machines are not designed to be secure.
PWN is pronounced OWNED. The "p" instead of "o" was placed because it was ironic to misspell stuff on purpose back in the 90s, as O is next to P on a qwerty keyboard. Just like we spelled porn as pRon. This is just as bad as most people mispronouncing nuclear as new-ku-lur, library as lye-berry, and ask as axe. We arrived at Idiocracy once COVID hit. Average IQ is hovering in the low 90s these days lol.
Is there a way where black jackets can submit the work they do, kind of like when a student submitted like a capstone project or a thesis paper or a combination of the two or all...
real hackers never protect their computers in the sense that people think, real hackers their computer from outside seem like ordinary computer with no protection and even not antivirus ...why??? because the moment your computer very well secured, you under scope..which mean you watched...because to secure computer well its not easy task...so the real deal hackers their computer under scaning look like ordinary computer...and under this conditions they do stuff secretly ...they basically blend their computers with all ordinary computers...
How do u defend against a screen overlay attack……. Happens at random….only visual cue is a slight dimming of the screen then back to regular when they stop …. Advice..
🎯 Key Takeaways for quick navigation: 00:35 🌊 Flow is a mental state of effortless engagement, where time seems to fly by, distractions are minimized, and a sense of oneness with the task is experienced. It's linked to positive emotions, creativity, accomplishment, increased productivity, enhanced learning, and academic achievement. 01:33 🧠 Flow is associated with specific changes in neural activity in regions related to attention, self-awareness, and self-consciousness, but many questions about its neuroscience remain. 02:31 💡 Flow is more likely to occur in activities that are intrinsically motivating, strike a balance between personal skill level and challenge, and have clear goals with opportunities for assessing progress. 03:59 ⚙️ To increase the chances of experiencing flow, create a quiet environment, break tasks into small segments, set challenging but achievable goals, and avoid focusing too much on achieving flow, as it may hinder the experience. Made with HARPA AI
That exactly what they did to me. Now I am totally ruined! What are you gonna do for me to be safe to just play games or even text anyone? Google keeps taking my pictures that are showing the hacks or the PsycOp's the government are doing to me. Do I just ignore these things?! Ass holes! Hackers suck because I am Not secure at all!!
ok i need some help so my roblox account just got hacked and i want to pull the person who did it ip and get all the info back to my account and the roblox pin but idk how to please someone help
Great work dude * excellent _ the ( net ) is just a ( web ) * once you get caught _ is like a labyrinth program inside a ( maze ) * best way is ( not ) to go in ( but ) ....?
This podcast singlehandedly beat covvid .
now im studying Practical ethical hacking .
Thanks Jack
Youre too stupid to be a hacker, posting a picture of yourself proves this.
the VM exploit should have been well over 10 mill reward. That is the most devastating vulnerability. the entire point of a VM is so that you'll be safe while bug testing. Imagine the consequences.
@inannabanana4404criminally controlled?
No kidding, I wonder if it's possible to break out of a nested vm?
Actually they were developed for serverspace first (VMware vSpehere, Proxmox) to maximize processing power while reducing hardware overhead. Pretty nifty tech actually and then it found its well earned place in cybersecurity.
I'm currently studying Cybersecurity as a bachelor's program. I thank you Jack for the podcast as background for studies and when I do hacking challenges :)
Let's gooo
do u have a socials I could use some help im not yet into college
No computer is indeed secure.
Once you become the target, your days are numbered.😢
Making terrorist threats?
@@Stopinvadingmyhardware probably a victim like myself, if someone wants in your system you can spend thousands trying to protect yourself... still had to format my rig.
Love listening to this I even started listening to your old stuff writing foe your new stuff keep up the great work!
I literally checked your channel 20 mins ago for new content lol. I sleep now to this. Thank you
perfect sleep time background, i used to play cyberpunk to these podcasts and it felt so right
if i become a hacker can i finally delete my internet history? 😂
You can already do that dumbass. 😂
Client side yes, server side never, however it would take a really skilled hacker for client side
Unfortunately, you're online. You've already lost. Welcome to the club
Such a lame joke by now.. and if you need to become a hacker to delete your history, you should probably be in jail.
U don't need to be a hAcKEr to delete ur browser's search history
Best podcast out there.
Keep doing what you do Jack!
Good even down to the final seconds. Always enjoy the closing quips and music.
imagine getting 10k and a laptop for finding a zero day that is worth millions...
Thank you for all you do, Jack. I am forever a fan
same here man
Is it possible Jack is warning us that no website is safe. Ever?
Sounds like it... From my experience, the only way to protect yourself is to turn off your computer, unplug the battery, toss it into the trash, then live like the amish...
@@BarbaricaSkateboards lol
4:03 "Microsoft Edge Bug" 👏 what a beautiful name for that heap of code 😂
Jack makes the best videos hands down.
He brings very experienced people on, just to talk about surface level information you could find reading page 1 search engine results. This podcast would be so much better if he actually used the knowledge of the guests instead of just using them as a cool prop.
@@saygo-png Everyone is entitled to their own opinion but I’d disagree. I feel you can truly tell he’s passionate about what he does and that’s the most inspiring aspect of his videos. Even if one doesn’t care about the topics he seems to bring them to life and makes you interested in Cybersecurity. That’s why I like his videos so much. I’d rather listen to him bring on entertaining guests on his show and explain what they’re saying in layman terms than a uninteresting lecture on the same topic where I don’t fully grasp on what’s being discussed.
@@saygo-png if he wants it to work on RUclips, he has to make it comprehensible for the largest group of people. I wish there were more technical stuff too ...
@@Entropy67 Yeah, I think the main purpose is to feed people with leads so they can take terms to search engines, many may find this stuff interesting as a hobby and just be casual.
@@angtang01 and everyones at a different level of knowledge in their own path, so being as general as possible is best. I wish there was like an outtakes section or something where they could rant on more complex in-depth topics, but I'm not really complaining. These vidoes are already very entertaining.
This is by far the best podcast out there! Thanks guys for such a well written and produced tech show. And im not even in tech. Bravo!
Nice to hear his voice! Those router hacking boys and their videos are awesome.
The best hackers are the ones who are never known
As a bug bounty hunter, I can confirm (classic meme) that this is help for bug bounty is amazing. :3
Listening while working. Love your content.
Essentially they use their conference to "intern" out others hard work. They provide a "prize" but the attacks and all information gathered is prperty of the conference and it's owners. Therefore they can then turn around and sell the individual attackers hard work that took them months/years as security prevention information to the respective browser companies....
yep. 10k prize for a vulnerability that is worth millions
That virtual machine escape is scary, damn!
I just had another weird experience of some dude sitting in front of our house in his car, leaving right before dawn when I got up to take care of our animals, he drove down the street, turned around, came back and snapped his head around to stare at me while driving back by. I was at the back door while this happened so how did he know where I was in order to whip his head around to stare right at me? He must have been watchung our kitchen window. It was definitely strange, seems like something more than stealing our wi fi. I don't do anything wrong so I don't get it.
I haven't noticed this kind of thing happening in several years. Maybe it's because I started talking to someone again because they owe me money, who knows, just wanted to document this in a public place.
Put some cameras up
Don’t worry. We’re there to protect you. Carry on normally and all will be well.
The Source has spoken.
@@Legiitpwn Good idea.
@@jaymethodus3421 Thank you, Source!
He probably grabbed your 4 way handshake if anything
I like it a lot better when you are being yourself man. It is a huge diff.
If you’re an world class ethical hacker, how do you protect yourself from wealthy, powerful, and dangerous actors wanting/demanding your services?
Wow, I really wanna join these guys but i don't really know where to start with reversing, idk, Firefox or something to find a vulnerability... I can barely understand my own programs reversed... compiler does some mysterious things. Or I need to learn more. 😥
I think they run decompilers that aren't perfect enough to recompile, but enough so to reverse engineer.. In this case to find working exploits. E. G MacBook air network exploit
@@CipherAndreghidra is your friend there, or similar programs.
With IT and OT industries, it's always about more and more learning is required. Which is one of the reasons I love the IT field. But if you're wanting/needing to decompile something ghidra will be your friend. Another tip. Osint osint osint. Research research research. It can be extremely mind meltingly boring at times but it's worth it when you find exactly what you're wanting/needing already made for you or at least poc'd at least a little.
@@rakdosrok5816 Thankfully I'm getting a degree in computer science in a cybersecurity stream, hopefully I get to learn more systematically from there to supplement all of my self taught stuff. It can get dizzying, the sheer number of stuff that there is to learn, not knowing where to start. I feel just being active in picking up on new stuff and learning the fundamentals and commonly used tools (and their principles ofc) over time is building up a knowledge base in my head that I can rely on in the future. Just feels like an infinite process lol
Of course some hackers can't travel for particular reasons, like in some countries having a criminal record will not let you have a passport (like the US) some aren't interested in the title etc
Saying who's the best hacker is like saying which religion is real while standing in Jerusalem, I'm pretty sure someone is gonna argue with you
So these are some of the most expensive vulnerablities, too bad they can't submit the bug to a corporation via their dedicated BBPs.
It's not a solution for the corporation. It's a solution for trend micro and they just happen to do good by providing information on vulnerabilities to the corporation it's going to affect.
Corporation should still have a dedicated VDP and BBP along with continuous security testing via pen test depending on the corporations risk profile.
Love your podcast brother.
YOU’RE THE MASTER OF KNOWLEDGE, INFORMATION OR INSIGHT! Let it be known!
Cringe
Man, sounds like cyber fiction. Amazing show
Finally my motivation routine for my 4.0 GPA let’s go
I wish I knew, about the existence of half the careers this dude covers, when I was getting into junior year of high school, lol.
@shadowuaw-0001 yeah I would of actually tried in school.. never had any direction
Background house music on this episode is very nice. (2 tracks)
Once again, another absolutely epic one!
We love the stories but it would be great if you could give solution or the way to avoid the problems mentioned Jack.
Learn more than you know now, become dangerous
This takes E-Sports to a whole new level... 😅
23:20 He is associated with the gaming community and looks at things differently? He is a speedrunner for sure!
If you win the competition you end up on the FBI watch list
Oh it's much easier to get onto some kind of list than you think. Just searching for osint topics or exploits will flag your internet traffic automatically by the nsa and homeland, and if you gain enough flags then you get noted down as potential danger or as a possible asset. Nuclear topics are the easiest way to get onto a list, especially if you start learning out to build things...
nice story, thanks for it.
Great Content ...
Listening from LA 🌴
It’s 11pm 🕚 on a hot rainy night in Chicago & I’m just 👀in’ for a story… long day = short attention span if ya know what I mean! Tried of death & distraction, who’s that kid… hacker dude, darknet that’s the one… my old time Radio 📻 of the 20th century replacement & eventually improvement… you’ve finally found a murder less mystery !🎉 & Much appreciated all around! Thanks 🙏
Amazing story 5:41
Great Content
No click exploits like that are exactly why. Security researchers don't even use a traditional operating system. They typically use something like cubes OS, which is hyper compartmentized And I can understand why people might not want to go that far, but you also can't just use a regular VM either. Because you actually need to get a hardened VM that has the proper security measures and the proper shit in place Because here's something else that might blow a couple people's minds. A virtual machine usually is not a security tool. It's a compatibility tool. So, the vast majority of virtual machines are not designed to be secure.
If they dont think they are the best, they can at least say they are the best transparent hackers in the world
PWN is pronounced OWNED. The "p" instead of "o" was placed because it was ironic to misspell stuff on purpose back in the 90s, as O is next to P on a qwerty keyboard. Just like we spelled porn as pRon. This is just as bad as most people mispronouncing nuclear as new-ku-lur, library as lye-berry, and ask as axe. We arrived at Idiocracy once COVID hit. Average IQ is hovering in the low 90s these days lol.
Master Pedro!
The confortable numb ranking boutique the relax and parking of phantom
Is there a way where black jackets can submit the work they do, kind of like when a student submitted like a capstone project or a thesis paper or a combination of the two or all...
If you know of them, and their names or even their handles... then they ain't the best. 🤦♂
The fact this needs to be explained.... 💩
Big up to that massive background soundtrack!! 🎉😊
Please interview more competition winners. :)
Ask google whos the best hacker they say kevin mitnick lol
Thought in another episode you referenced Kevin Mitnik was/is the greatest (all-time)?
Getting into host computer from virtual machine? that sounds crazy.
Been possible for ages unfortunately
I wanna see how a hacker gets past a antivirus like Kaspersky and Bitdefender it would be cool sense Kaspersky has system watcher and all that
posted just as I started to work :)
Razor and Blade are pretty good hackers
Tesla hackers are so cool! I'm friends with some guys that have pwned Teslas at conferences before
The best hacker is the one we don't know about.
real hackers never protect their computers in the sense that people think, real hackers their computer from outside seem like ordinary computer with no protection and even not antivirus ...why??? because the moment your computer very well secured, you under scope..which mean you watched...because to secure computer well its not easy task...so the real deal hackers their computer under scaning look like ordinary computer...and under this conditions they do stuff secretly ...they basically blend their computers with all ordinary computers...
Facts. An AV is like a spyware because they scan your PC all the time
Hearing samsung got breached just breaks my heart
My man!
I don't know whether to be scared or inspired. lol
whats the tracklist for this episode
Have they found the NSA backdoor yet?
How do u defend against a screen overlay attack……. Happens at random….only visual cue is a slight dimming of the screen then back to regular when they stop …. Advice..
First line of this episode: Who is the world's greatest hacker? My GF pointed at me. She is so sweet she thinks I'm 733t.
She thinks you're TEET ?
Does zdi grant cves?
What's the best browser
How has this guy only got 320l subscribers,
One click seems to be wildly underestimating the complexity of hacking
It only takes one click from the victim to install a virus
2 clicks
So pegasus and pegasus2 arent as fancy as they are claimed to be? What exactly are you saying..?
click one malicious link or notification ;)
I think the best hackers in the world are people that will never enter a contest and will never be known to the general public.
Never knew Seth Rogen was into hacking
You guys are good 😊
I recognize GeoHot’s voice haha
Hi friend!!!
who is best? answers depend on their exploit kits
30:22 😮
whats with 0day broski?
Just wait until the real criminals get these exploits and then you too can get sexually assaulted and have your life ruined.
Most hackers aren't real hackers...... most of them can't even hack the fbi lol!
Zerodium don't pay for all 0days only software of some vendors mostly FANG
Ten cent.
Of course they have one of the best teams 😂😂
Pop Quiz Answer: John McAfee
Alter ego the book of training of bitcóin is pasatime
👀
🎯 Key Takeaways for quick navigation:
00:35 🌊 Flow is a mental state of effortless engagement, where time seems to fly by, distractions are minimized, and a sense of oneness with the task is experienced. It's linked to positive emotions, creativity, accomplishment, increased productivity, enhanced learning, and academic achievement.
01:33 🧠 Flow is associated with specific changes in neural activity in regions related to attention, self-awareness, and self-consciousness, but many questions about its neuroscience remain.
02:31 💡 Flow is more likely to occur in activities that are intrinsically motivating, strike a balance between personal skill level and challenge, and have clear goals with opportunities for assessing progress.
03:59 ⚙️ To increase the chances of experiencing flow, create a quiet environment, break tasks into small segments, set challenging but achievable goals, and avoid focusing too much on achieving flow, as it may hinder the experience.
Made with HARPA AI
Wrong fucking video idiot lol
That exactly what they did to me. Now I am totally ruined! What are you gonna do for me to be safe to just play games or even text anyone? Google keeps taking my pictures that are showing the hacks or the PsycOp's the government are doing to me. Do I just ignore these things?! Ass holes! Hackers suck because I am Not secure at all!!
👏
This guy sounds like seth rogen lol
Uploading at 3am EST, smh.
Guys am going to be a black hat 😂 hacker ☣️
Sure, kid.
this company incentivises corporations not to pay out for zero days because now they can get em for free...
120 days is FAR too long.
Trend Micro 4 evs .
ok i need some help
so my roblox account just got hacked and i want to pull the person who did it ip and get all the info back to my account and the roblox pin but idk how to please someone help
Great work dude * excellent _ the ( net ) is just a ( web ) * once you get caught _ is like a labyrinth program inside a ( maze ) * best way is ( not ) to go in ( but ) ....?
Mf crazy. Awesome
Jack sounds like Ai kinda effeminate Ai negl
Had to down thumb to hopefully get the algo to rec a different video. I've heard this one so many times because of autoplay
russians u know...