DEF CON 23: Confessions of a Professional Cyber Stalker - Ken Westin

Sdílet
Vložit
  • čas přidán 17. 09. 2015
  • Missed DEF CON 23? Listen to Ken Westin, Tripwire Sr. Security Analyst, talk about his experience as a professional cyber stalker.
  • Věda a technologie

Komentáře • 54

  • @yakushitamahacka4199
    @yakushitamahacka4199 Před 8 lety +192

    Man i have seen other DefCon Lectures too and the guys were screaming from laughter even if something was not very funny!! This guy made some excellent jokes and no response....tough audience! :P
    Nice Presentation!!!

    • @lksw42439
      @lksw42439 Před 7 lety +22

      that's cause this mostly appeals to feds, and they don't have any sense of humor

    • @yakushitamahacka4199
      @yakushitamahacka4199 Před 7 lety +2

      Agent800 Hahaha maybe that's the case..

    • @yuekitsune7629
      @yuekitsune7629 Před 7 lety +1

      very tough ·~·

    • @probablynot8154
      @probablynot8154 Před 7 lety +9

      I thinks it's because you just can't hear the audience most of the time.

  • @HeavenifHell
    @HeavenifHell Před 8 lety +12

    Funny enough, one of the faces wasn't actually blurred.

  • @fudanchu8436
    @fudanchu8436 Před 8 lety +15

    Clever use of GPS and cameras - which are really proliferating in electronics now.

  • @ericsbuds
    @ericsbuds Před 8 lety +42

    10 years in jail for guessing passwords and distributing pictures yikes. certainly should be illegal but damn... 10 years... he must have done other stuff too

    • @the3picshow40
      @the3picshow40 Před 7 lety +19

      No, computer crimes is a harder punishment than for example rape or drug dealing :)

  • @julienpiltant2416
    @julienpiltant2416 Před 6 lety +2

    Nice guy, great conference.

  • @vinnyvdalidemonet8527
    @vinnyvdalidemonet8527 Před 6 lety

    Nice Job. That is work to be proud of Ken.

  • @jodelboy
    @jodelboy Před 8 lety

    THANKS!

  • @officergregorystevens5765

    I have a prety simple idea for law enf.. how about equipping LEO agencies with laptops or other small devices , preferably capable of logging running say kali linux rolling or again, a similar distro specifically with kismet running, looking for with airodump-ng as well (logging with that too) the MAC address(es) of the stolen device(s).. think that might be helpful? At least to a degree.

  • @jackkraken3888
    @jackkraken3888 Před 8 lety +2

    Very cool video, the idea that the exif info could be used to track down criminals is pure genius (geo-tagging aside of course) , I guess one question is if the exif info of photos on Facebook or Instagram for example have been indexed. This seems like a really great way to recover stolen items.
    If only every digital device that takes pictures stored serial numbers.

    • @nerdhabit6778
      @nerdhabit6778 Před 7 lety +1

      Jack Kraken I would assume the compression would wipe the exif data. I could be wrong though. Definitely worth a try. He gave you the link to the tools.
      (Edited due to autocorrect fail)

    • @yannb1622
      @yannb1622 Před 7 lety

      Nerd Habit exif is not wiped on Facebook as if you take a photo with geotagging (picture from a camera with gps activated), Facebook asks you to set the place where the photo has been taken, and it's always the right place where it was taken.

  • @LG-Devil
    @LG-Devil Před 7 lety +8

    Great example of hackers using their skills for good. In order to scrape the exif data from all flickr (or other source) does that means downloading all 4 billion images or can you scrape exif without downloading? What language did you program your scrape from php? Some older cameras do not have exif compatible metadata, what would you do in that case just call it a lost cause? Excellent presentation. Kind of sad that some hackers out there are more ethical than data mining/marketing companies. Great publicity for gadgettrak too, I'll remember the name. Congratulations.

  • @mosipd
    @mosipd Před 7 lety +28

    Man, he didn't even get a chuckle out of his jokes. It was a good talk otherwise though.

    • @probablynot8154
      @probablynot8154 Před 7 lety +12

      He did, lots in fact. The audience is very quiet in the audio.

  • @ManuelGutierrez-zb5xm
    @ManuelGutierrez-zb5xm Před 8 lety +17

    This guy is brilliant.

  • @mikeseitz1381
    @mikeseitz1381 Před 8 lety +29

    Sooooo always wipe the hard drive after you steal a computer/cellphone?

    • @RafaelSouza-vk9km
      @RafaelSouza-vk9km Před 8 lety +5

      +Eric Norton you meant burn it? haha
      Because when you just wipe it, the data is still there, you just lose the pointers to them. What you can do is to overwrite all the data and then format again

    • @igrewold
      @igrewold Před 8 lety +5

      Some tracking software is embedded in the BIOS. Even if you format the device it will reinstall itself back onto the OS and report home. I had an Asus laptop that had this feature a long time ago. And once it gets turned on in the BIOS there was no way of turning it off even if you disabled it there!

    • @lksw42439
      @lksw42439 Před 7 lety +1

      but what if it's got a hidden partition? or something in the firmware? I'd just use a new harddrive, and make sure to spoof your mac after you reinstall on a new HDD.

    • @zyxwvutsrqponmlkh
      @zyxwvutsrqponmlkh Před 7 lety +3

      and then change the serial numbers on every chip.

    • @zyxwvutsrqponmlkh
      @zyxwvutsrqponmlkh Před 7 lety +1

      Lets say I offer people a phone recovery service. People register there phones with me and upload the s/n of there device. I then sub-license with app developers to report back if any of there apps are running on a device with a s/n on a list I provide to them, they get a bounty for finding a device. Tell me how are is your wiping of the phone going to stop me?

  • @jackle3002
    @jackle3002 Před 5 lety

    what was the crazywall software he mentioned. Multigo? didnt find anything

  • @peterellis4166
    @peterellis4166 Před 7 lety +2

    That grin at the end lol, so proud of himself

  • @compucar03
    @compucar03 Před 8 lety

    How can I search the EXIF Database?

  • @t1mmy13
    @t1mmy13 Před 7 lety +1

    Took a while to get up to steam, but this is a great talk!

  • @passengerify
    @passengerify Před 5 lety +1

    Interesting...

  • @thespiffingamerican
    @thespiffingamerican Před 4 lety

    What an ending.

  • @Kelo60
    @Kelo60 Před 6 lety +1

    I got involved with alot of dudes in my past who where crocks and would steal laptops. They paid me 10% of what it sold for to wipe the drives and install the OS. Needless to say they all ended up in jail and I got away with 20k for school. No joking was the easiest money I ever made. But now Im on the Up and Up and dont do black hat.

  • @shawn_li
    @shawn_li Před 6 lety +1

    how do u spy on someone?

  • @transkryption
    @transkryption Před 5 lety

    Cool

  • @ACScomputerbuild
    @ACScomputerbuild Před 8 lety +4

    iss switched to linux in may

  • @bjdooi
    @bjdooi Před 7 lety

    i already knew to be paranoid while online, now im fukn freaked, boogey data got all my shiet

  • @marcusbogle5389
    @marcusbogle5389 Před 8 lety +1

    has anyone download the tools

  • @Tech_Traveler
    @Tech_Traveler Před 5 lety

    Good, I hate thieves!

  • @kingti85
    @kingti85 Před 8 lety +35

    A lot of these Def Con videos are really...meh.
    I likeded dis 1 a lotz

    • @lksw42439
      @lksw42439 Před 7 lety +11

      it all depends what you are into...

  • @aronpop1447
    @aronpop1447 Před 6 lety

    how in the fuck do you take a picture from a laptop's webcam that is not yours ?? HOW

  • @Some_Beach
    @Some_Beach Před 5 lety

    Blackhat had an ethics issue? I thought you had to have a 0day in your presentation to have a talk there

  • @CallOfDutyMatrix
    @CallOfDutyMatrix Před 8 lety +1

    hi

  • @cam615615
    @cam615615 Před 8 lety

    k