DEF CON 23: Confessions of a Professional Cyber Stalker - Ken Westin

Поделиться
HTML-код
  • Опубликовано: 22 ноя 2024

Комментарии • 54

  • @yakushitamahacka4199
    @yakushitamahacka4199 8 лет назад +192

    Man i have seen other DefCon Lectures too and the guys were screaming from laughter even if something was not very funny!! This guy made some excellent jokes and no response....tough audience! :P
    Nice Presentation!!!

    • @lksw42439
      @lksw42439 8 лет назад +22

      that's cause this mostly appeals to feds, and they don't have any sense of humor

    • @yakushitamahacka4199
      @yakushitamahacka4199 8 лет назад +2

      Agent800 Hahaha maybe that's the case..

    • @yuekitsune7629
      @yuekitsune7629 8 лет назад +1

      very tough ·~·

    • @probablynot8154
      @probablynot8154 7 лет назад +9

      I thinks it's because you just can't hear the audience most of the time.

  • @fudanchu8436
    @fudanchu8436 9 лет назад +15

    Clever use of GPS and cameras - which are really proliferating in electronics now.

  • @julienpiltant2416
    @julienpiltant2416 6 лет назад +2

    Nice guy, great conference.

  • @HeavenifHell
    @HeavenifHell 9 лет назад +12

    Funny enough, one of the faces wasn't actually blurred.

  • @ericsbuds
    @ericsbuds 9 лет назад +42

    10 years in jail for guessing passwords and distributing pictures yikes. certainly should be illegal but damn... 10 years... he must have done other stuff too

    • @the3picshow40
      @the3picshow40 8 лет назад +19

      No, computer crimes is a harder punishment than for example rape or drug dealing :)

  • @vinnyvdalidemonet8527
    @vinnyvdalidemonet8527 7 лет назад

    Nice Job. That is work to be proud of Ken.

  • @ManuelGutierrez-zb5xm
    @ManuelGutierrez-zb5xm 8 лет назад +17

    This guy is brilliant.

  • @LG-Devil
    @LG-Devil 8 лет назад +8

    Great example of hackers using their skills for good. In order to scrape the exif data from all flickr (or other source) does that means downloading all 4 billion images or can you scrape exif without downloading? What language did you program your scrape from php? Some older cameras do not have exif compatible metadata, what would you do in that case just call it a lost cause? Excellent presentation. Kind of sad that some hackers out there are more ethical than data mining/marketing companies. Great publicity for gadgettrak too, I'll remember the name. Congratulations.

  • @t1mmy13
    @t1mmy13 8 лет назад +1

    Took a while to get up to steam, but this is a great talk!

  • @jackkraken3888
    @jackkraken3888 9 лет назад +2

    Very cool video, the idea that the exif info could be used to track down criminals is pure genius (geo-tagging aside of course) , I guess one question is if the exif info of photos on Facebook or Instagram for example have been indexed. This seems like a really great way to recover stolen items.
    If only every digital device that takes pictures stored serial numbers.

    • @nerdhabit6778
      @nerdhabit6778 8 лет назад +1

      Jack Kraken I would assume the compression would wipe the exif data. I could be wrong though. Definitely worth a try. He gave you the link to the tools.
      (Edited due to autocorrect fail)

    • @yannb1622
      @yannb1622 7 лет назад

      Nerd Habit exif is not wiped on Facebook as if you take a photo with geotagging (picture from a camera with gps activated), Facebook asks you to set the place where the photo has been taken, and it's always the right place where it was taken.

  • @peterellis4166
    @peterellis4166 7 лет назад +2

    That grin at the end lol, so proud of himself

  • @Kelo60
    @Kelo60 7 лет назад +1

    I got involved with alot of dudes in my past who where crocks and would steal laptops. They paid me 10% of what it sold for to wipe the drives and install the OS. Needless to say they all ended up in jail and I got away with 20k for school. No joking was the easiest money I ever made. But now Im on the Up and Up and dont do black hat.

  • @mikeseitz1381
    @mikeseitz1381 8 лет назад +29

    Sooooo always wipe the hard drive after you steal a computer/cellphone?

    • @RafaelSouza-vk9km
      @RafaelSouza-vk9km 8 лет назад +5

      +Eric Norton you meant burn it? haha
      Because when you just wipe it, the data is still there, you just lose the pointers to them. What you can do is to overwrite all the data and then format again

    • @igrewold
      @igrewold 8 лет назад +5

      Some tracking software is embedded in the BIOS. Even if you format the device it will reinstall itself back onto the OS and report home. I had an Asus laptop that had this feature a long time ago. And once it gets turned on in the BIOS there was no way of turning it off even if you disabled it there!

    • @lksw42439
      @lksw42439 8 лет назад +1

      but what if it's got a hidden partition? or something in the firmware? I'd just use a new harddrive, and make sure to spoof your mac after you reinstall on a new HDD.

    • @zyxwvutsrqponmlkh
      @zyxwvutsrqponmlkh 7 лет назад +3

      and then change the serial numbers on every chip.

    • @zyxwvutsrqponmlkh
      @zyxwvutsrqponmlkh 7 лет назад +1

      Lets say I offer people a phone recovery service. People register there phones with me and upload the s/n of there device. I then sub-license with app developers to report back if any of there apps are running on a device with a s/n on a list I provide to them, they get a bounty for finding a device. Tell me how are is your wiping of the phone going to stop me?

  • @mosipd
    @mosipd 8 лет назад +28

    Man, he didn't even get a chuckle out of his jokes. It was a good talk otherwise though.

    • @probablynot8154
      @probablynot8154 7 лет назад +12

      He did, lots in fact. The audience is very quiet in the audio.

  • @officergregorystevens5765
    @officergregorystevens5765 7 лет назад +1

    I have a prety simple idea for law enf.. how about equipping LEO agencies with laptops or other small devices , preferably capable of logging running say kali linux rolling or again, a similar distro specifically with kismet running, looking for with airodump-ng as well (logging with that too) the MAC address(es) of the stolen device(s).. think that might be helpful? At least to a degree.

  • @thespiffingamerican
    @thespiffingamerican 4 года назад

    What an ending.

  • @jackle3002
    @jackle3002 5 лет назад

    what was the crazywall software he mentioned. Multigo? didnt find anything

  • @passengerify
    @passengerify 5 лет назад +1

    Interesting...

  • @bjdooi
    @bjdooi 7 лет назад

    i already knew to be paranoid while online, now im fukn freaked, boogey data got all my shiet

  • @jodelboy
    @jodelboy 8 лет назад

    THANKS!

  • @shawn_li
    @shawn_li 7 лет назад +1

    how do u spy on someone?

  • @compucar03
    @compucar03 9 лет назад

    How can I search the EXIF Database?

  • @ACScomputerbuild
    @ACScomputerbuild 9 лет назад +4

    iss switched to linux in may

  • @kingti85
    @kingti85 8 лет назад +35

    A lot of these Def Con videos are really...meh.
    I likeded dis 1 a lotz

    • @lksw42439
      @lksw42439 8 лет назад +11

      it all depends what you are into...

  • @Some_Beach
    @Some_Beach 5 лет назад

    Blackhat had an ethics issue? I thought you had to have a 0day in your presentation to have a talk there

  • @aronpop1447
    @aronpop1447 6 лет назад

    how in the fuck do you take a picture from a laptop's webcam that is not yours ?? HOW

  • @Tech_Traveler
    @Tech_Traveler 5 лет назад

    Good, I hate thieves!

  • @transkryption
    @transkryption 5 лет назад

    Cool

  • @marcusbogle5389
    @marcusbogle5389 8 лет назад +1

    has anyone download the tools

  • @CallOfDutyMatrix
    @CallOfDutyMatrix 9 лет назад +1

    hi

  • @cam615615
    @cam615615 8 лет назад

    k