Skip to main content

Logo

CIS 75 - Principles of Computer Security (Shared screen with speaker view)
BG
31:53
T mobile has some good plans
Joseph Calcagno
32:37
8-0
BG
33:08
they have trump's Pee tape
Joseph Calcagno
33:55
140 mil americans?
BG
35:05
No HIPPA like fine?
Jacobs Otto
35:20
Equifax's website they created to "tell you" if you a part of the breach is a joke, when signing up to see, you are waiving your right to sue them for losses.
Joseph Calcagno
36:05
like the blue cross hack
Joseph Calcagno
36:12
sent me one
Joseph Calcagno
36:33
letter
Joseph Calcagno
37:37
usually say they dont know to avoid lawsuits
BG
37:46
so the terrorist win...
Joseph Calcagno
40:17
so make up fake answers that only you know
Ciaran Farley
42:24
so the form they use for applications wasn't properly protected against people inserting database commands into their fields and getting data dumps out of it ?
Jacobs Otto
42:44
Little Bobby Tables
bruce hartman
43:08
equifax changed the free service to not require you to waive your right to sue them
Kyle Bruder
43:17
yeah right. i bet its internal
BG
44:34
can I now get someone else's report?
BG
45:48
your score is sacred.. your identity.. not so much
Kyle Bruder
47:24
cinfidentialaity
Philip Lawrence
47:24
Accessibility
Tony Farrell
47:27
Availability
Ryan Mock
47:35
availability
bruce hartman
47:37
availbility
BG
47:39
availability
Sam Strelitz
47:39
availability
Kevin Cameron
47:44
availability
Joseph Calcagno
49:36
uh oh
Kyle Bruder
49:51
credit crun
Kyle Bruder
49:56
*crunch
Jacobs Otto
50:13
in before the credit system finally dies
Kyle Bruder
50:18
no ty
Joseph Calcagno
54:54
your phone was there
Jacobs Otto
55:48
In 2017, theres no foolproof way to prove you weren't somewhere, but at some point, some amount of information has to be acceptable enough to prove you were not there.
Kyle Bruder
55:55
that slide is not very reassuring
BG
56:43
like wait months to tell us?
Kyle Bruder
58:28
JP is very tech savvy
BG
59:02
they said it "wasn't related"
Ivers Spivey
59:12
Rick Smith chairman an CEO
Jacobs Otto
59:51
------E
Kyle Bruder
01:00:59
when SF freezes over
BG
01:01:53
it'll be in florida
Joseph Calcagno
01:03:26
copied
BG
01:04:33
one experian's loss is another hacker's gain
Sam Strelitz
01:04:42
unintentional, intentional
Sam Strelitz
01:04:53
data on laptop, laptop
Kevin Cameron
01:04:57
a computer
Kyle Bruder
01:04:57
computer
Philip Lawrence
01:04:57
computer
bruce hartman
01:04:58
computer
Jacobs Otto
01:04:59
laptop
Sam Perez
01:05:00
computer
Alejandro Jara
01:05:04
both
Tony Farrell
01:05:04
hardware
Sam Perez
01:05:05
unintentional, intentional
Ryan Mock
01:05:14
the information on the computer was the assest and it was probably lost
Ciaran Farley
01:07:18
left is passive
Joseph Calcagno
01:07:21
intention is a tough thing to prove
Jacobs Otto
01:07:40
Okay, Experian
Kyle Bruder
01:07:50
auto screen lock < 5 min
BG
01:08:05
is it passive if you were downloading the database searching for cheater A and passively found cheater B?
Jacobs Otto
01:09:44
Rule 29 states: In the internet all girls are men and all kids are undercover FBI agents.
Ryan Mock
01:10:38
passive
bruce hartman
01:10:41
active
Joseph Calcagno
01:10:44
passive
Edgar Austodillo
01:10:47
passive
BG
01:10:48
active
Kyle Bruder
01:10:48
passive
Ivers Spivey
01:10:53
started active but info was passivley found
Alejandro Jara
01:10:54
passive
Kevin Cameron
01:10:59
active. You still had to go out of your way to get the DB.
Joseph Calcagno
01:11:03
for fun isnt malicious intent
Kyle Bruder
01:11:44
no
Sam Strelitz
01:11:52
sort of? You're benefiting from an attack
Joseph Calcagno
01:12:14
your initial intent is not to leak if its fo fun
Kevin Cameron
01:12:31
intent is a completely different issue.
Jacobs Otto
01:12:43
^
Ivers Spivey
01:13:35
thanks for clearing that up
Kyle Bruder
01:14:43
mikes macbook!
Kyle Bruder
01:15:02
LMAO
BG
01:15:11
at least a cup of coffee
Ivers Spivey
01:15:54
I blame Mike he said it was passive
Kyle Bruder
01:15:56
its possible on a mac
Jacobs Otto
01:16:34
If it's not possible on your current hardware, $15 buys you a USB dongle that does support it.
Kyle Bruder
01:16:44
no way!
Chris Copus
01:16:48
nope
bruce hartman
01:16:48
no
Philip Lawrence
01:16:48
not by itself
Ivers Spivey
01:16:49
Those things are awesome.
Alejandro Jara
01:16:54
no
Sam Strelitz
01:16:55
Depends on intent. To spy on people is unethical, to repair their wifi is ethical.
Edgar Austodillo
01:16:55
depends on your intent
Vance Kelly
01:17:03
no
Kevin Cameron
01:17:05
depends on what you do with the information.
Kyle Bruder
01:17:13
maybe you are monitoring for your own protection
BG
01:17:15
unethical without consent
Joseph Calcagno
01:17:18
yes why would you need that information if you didnt have a use for it
Ryan Mock
01:17:21
idk
Jacobs Otto
01:17:23
Well aside from white hat or black hat, is it ethical to do just for fun?
Kevin Cameron
01:17:26
maybe you're the owner of the shop testing your own security.
Ivers Spivey
01:17:33
sure. as long as you dont use the info
BG
01:17:41
my other professor said don't do it
Ciaran Farley
01:18:15
are the $8 edimax wifi chips that say "made for raspberry pi" on the package compatable with wireshark ?
BG
01:18:27
research
Jacobs Otto
01:19:05
Any wifi card with the ability to enable Promiscuous mode should work just fine
Sam Strelitz
01:19:27
Might get banned from the coffee shop.
Ryan Mock
01:19:32
im a cis student..
BG
01:19:52
I'm lonely
Joseph Calcagno
01:19:53
someone will eventually look over your shoulder then want to fight you
Chris Copus
01:20:11
lol
BG
01:20:27
we should have wireShark week
Joseph Calcagno
01:20:40
get a privacy screen
BG
01:21:13
you learn they have a gun and hate snoopy people
Kyle Bruder
01:22:46
tough break
Joseph Calcagno
01:23:00
penetration testing is HIPPA compliance
Kevin Cameron
01:23:01
@BG: There's a whole Wireshark class here at Cabrillo, apparently.
Joseph Calcagno
01:24:06
healthIT.gov procedures and policies
Kevin Cameron
01:24:10
kill it with fire
Kyle Bruder
01:24:11
Its like the problem with the relationship between the military general and the sovereign from Art of War
Jacobs Otto
01:24:46
Can vouch for professor Lemus, he's great
Ryan Mock
01:26:26
election
BG
01:26:37
pee tape
Joseph Calcagno
01:27:07
indirect is better?
Sam Strelitz
01:27:13
Oh, a botnet DDOS attack
Sam Strelitz
01:27:21
virus all the computers, then control them all to flood a site
Joseph Calcagno
01:27:51
doesnt expose your identity
BG
01:30:08
that's a poor use of camera access
Joseph Calcagno
01:30:39
yes
Ryan Mock
01:30:45
could be
Kyle Bruder
01:31:36
so attack has to have a loss and loss has to be an object?
Kyle Bruder
01:32:30
ah
BG
01:36:04
clear as mudd
Joseph Calcagno
01:36:41
hmmm
Joseph Calcagno
01:37:13
everything has a potential to br vulnerable
Joseph Calcagno
01:37:21
until to find it
Joseph Calcagno
01:37:29
you dont know for sure
Joseph Calcagno
01:38:46
as technology evolves more vulnerabilities may be reveiled
BG
01:41:18
wiki has a heart
BG
01:41:33
and they like to keep it beating
Kyle Bruder
01:42:03
did they leak the tools or the descriptions
Kyle Bruder
01:42:24
:|
Joseph Calcagno
01:42:48
so the CIA made this software available to the public by reveiling the code?
Kevin Cameron
01:43:26
you could kill a lot more than hours with that...
Joseph Calcagno
01:45:22
oops you lost a whole day of data
Ciaran Farley
01:46:06
why hasent anyone taken components from laptop PSUs and indegrated batteries into desktop powersupplies ?
Kevin Cameron
01:48:01
@Ciaran: isn't that what a UPS does?
Ivers Spivey
01:48:28
hahaha
Ivers Spivey
01:48:46
oh posture
Jacobs Otto
02:08:48
Can't wait to read next years report
BG
02:11:09
we can meet at starbucks
Kyle Bruder
02:12:02
very pro!
Ciaran Farley
02:18:37
having a car with holes in the roof and being a dj could be very expensive !
Joseph Calcagno
02:19:08
didnt see any group selections
Ciaran Farley
02:19:19
(earlier you said your wife's car had holes in the roof and you just said she is a dj)
Ivers Spivey
02:20:39
awesome.
Ciaran Farley
02:20:40
to my team, I have 3 500watt video studio lights and a canon t6i and 3 green screens and a zoom h6 linear audio recorder (if you want to do something high production value)
Edgar Austodillo
02:21:01
hey joseph
Edgar Austodillo
02:21:08
we should talk about when to meet
Joseph Calcagno
02:21:12
what day works for you?
Kyle Bruder
02:30:15
:D
BG
02:32:05
shoot first and ask questions later
Ivers Spivey
02:32:16
bang stop or ill shot
Kevin Cameron
02:32:23
"We have to search all droids, no exceptions."
Joseph Calcagno
02:32:25
if your preventing a jedi
Chris Copus
02:32:29
Not be weak to force persuasion lol
Joseph Calcagno
02:32:37
make safeguards against jedi powers
Edgar Austodillo
02:32:38
use droids to make the inspection
Ryan Mock
02:33:24
obi wan and his mind
Sam Strelitz
02:33:25
Obi Wan, Mos eisley?
Alejandro Jara
02:33:28
obi
Kyle Bruder
02:33:34
obi wan subject
Chris Copus
02:33:36
Object = Mos Eisley, Subject = Old Ben
Edgar Austodillo
02:33:39
Subject: Obi Wan and CrewObject: Mos EisleyExploit: Weak minds
Kevin Cameron
02:33:39
Obi-Wan, and Entry to Mos Eisley
Tony Farrell
02:33:43
Obi is subject Mos Eisley is object
Kevin Cameron
02:33:49
Jedi Mind Trick
Kyle Bruder
02:33:51
mind control;
Kyle Bruder
02:33:53
the force
Sam Strelitz
02:33:56
exposure
Ryan Mock
02:33:57
exposure
Kyle Bruder
02:34:00
vulnerabilit
Tony Farrell
02:34:04
exposure
Chris Copus
02:34:06
both?
BG
02:34:08
vulnerability
Kevin Cameron
02:34:09
vulnerability
Joseph Calcagno
02:34:10
vulnerability
Ivers Spivey
02:34:24
exposure the vulnerablility is being exploited
Alejandro Jara
02:34:25
vulnerability
Kevin Cameron
02:34:29
an exposure would be Obi-Wan knowing that stormtroopers are weak minded.
Joseph Calcagno
02:34:30
jedi using mind control is exposure
Kyle Bruder
02:34:50
will that ? be on the final?
BG
02:36:13
I'm sure his breath is a threat agent
Chris Copus
02:36:17
Threat is force persuasion, threat agent is Luke
Sam Strelitz
02:36:47
Jedi powers, mind trick?
Kyle Bruder
02:36:56
Luke is agent
Ryan Mock
02:37:00
mind control, luke
Kevin Cameron
02:37:02
Threat: Force Persuasion, Threat Agent: Luke
Joseph Calcagno
02:37:03
threat mind control agent skywalker
Chris Copus
02:37:04
ah right
Kyle Bruder
02:37:04
threat is the force
Vance Kelly
02:37:09
trick, boy
Alejandro Jara
02:37:10
agent luke
Tony Farrell
02:37:13
threat is mind control threat agent is Luke
Alejandro Jara
02:37:24
threat mind control
Joseph Calcagno
02:39:19
do we really know whether or not Mike is a Martian
Joseph Calcagno
02:40:04
haha
BG
02:40:47
does mike turn when you say alexa?
Ciaran Farley
02:41:00
ok google
Joseph Calcagno
02:44:34
haha windows 10 auto update fail
Kyle Bruder
02:47:11
:D
BG
02:47:30
that's a hard life
Kyle Bruder
02:49:00
if time is a threat what would be the agent?
Ivers Spivey
02:49:15
failure or death?
Joseph Calcagno
02:49:16
hardware failure
BG
02:49:23
clocks
Kyle Bruder
02:49:35
*nods*
Kyle Bruder
02:50:36
bad RAM
Joseph Calcagno
02:50:44
document new RAM sticks installed
Joseph Calcagno
02:51:04
makes next failure eaiser to identify
Joseph Calcagno
02:51:16
assuming you bought good RAM
Kyle Bruder
02:51:18
isn’t RAM easy to test?
Kyle Bruder
02:51:55
*nods*
Ivers Spivey
02:54:43
hahaha
Kyle Bruder
02:55:01
simian army
BG
02:55:08
do it from Mike's computer
BG
02:55:31
the 2 projectors did it
Ciaran Farley
02:57:20
sudo apt-get update && sudo apt-get upgrade
Kyle Bruder
02:58:12
Thanks MIKE!!!!!