CIS 75 - Principles of Computer Security - Shared screen with speaker view
What is your student ID, Mike?
just until oct 32
You know it Mike
oh yeah sorry
oh geez lol
RIP in peace us
No dont show it
my power settings kicked in during recording hahah
Good job guys!
Yeah, good job!
the music was eerie and fit the tone of the dark world of identity theft
was there someone typing in the background
accuracy and integrity
first one is weighed
the ddos answer was availability
utility has lost it's usefulness
Shit my kitchen is flooding
could you say that accuracy happens outside of the function and integrity happens within the function?
and affects the integrity of the data?
so someone playing with a magnet a little too close to a hard drive could be a loss of accuracy ?
accuracy can affect integrity
i lost 20 lbs that semester
those taquitos aren't that bad if you get them at the right time of day.
loss of bass
my ears say loss
theres a filter for pops
When someone figures out an attack?
When the bad guys know about it.
when is beomes known
When attackers are aware of a vulnerability, it is an exposure
attacker identifies vulnerability
I heard it was Mike trying to make a point
date of birth social security
ssn is new material
how did eternal blue have anything to do with exfiltration? That's an encryption sploit?
email name and password
oh no just before the midterm
they can use my print balance at the library!!!!
FYI I got eternal blue running on WINE
This is why we can't have nice things.
trumps will tweet keys by morning
so the fact that my servers are running the default security settings was a vulnerability but now that ive told you its an exposure ?
That's how the NSA lost their stuff in the first place.
so are those key leaks how programs like microsoft toolkit trick windows into thinking its activated ?
Does eternal blue leverage the old 'hack' where you'd do start->run and then type in "\\<hostname or ip\$c" to get read/write access to the C drive?
even if fracking can not sure if its intentional
if I intentionally wanted to burn a tree outside and it fell on the 800 building and that bured down, was that unintentional? I didn't mean to
hard to prove a persons intention though
a country testing a nuclear weapon and accidentailly making a giant emp that takes out the power grid would be ...?
indirect intentional attack?
depends on your intention
they didnt have the policies in place to prevent that attack
to all employees do not plug in foreign devices lol
my refrence is specificallty to in the show leverage, the cherecter hardison splices into an ethernet cable in the wall so he can watch teh security cameras to help the rest of the team not be seen
I just wathced a ducmentary about using a small device tapped into the wire and then using wirelss/radar to veiw the feed.
plus the mic in the bag helped
worm in a trojan horse that caused a virus
Algorithm recovers speech from the vibrations of a potato-chip bag filmed through soundproof glass.
hey maybe after doing this project I can do the same thing to my servers to remove the exposure I talked about earlier
make opus talk..
wireless as well?
lol i locked myself out of my home webdav by doing an openvas scan
tell you where to find the cabrillo data
white hat with Khakis?
look. I found a power strip... expliot it
a mysterious 4000W heater shows up
What about road apples?
carter could walk about with a couple pi's
giving me an A will reduce your risk of loss
If you increase his risk of loss, you might get an A.
are we allowed to team with future students ?
what is the job title we are immitating with this project ?
I did the lab as a timeline going into each part of the breach and defining a mechanism used in each step instead of focusing on the first part was that ok? (i havent checked my grade yet)
capec 137 - parameter injection
was that not how they got in?
i guess i just didn’t know where to stop on this data base
it is a black hole