Skip to main content

Logo

CIS 75 - Principles of Computer Security (Shared screen with speaker view)
Jacobs Otto
27:41
What is your student ID, Mike?
Kevin Cameron
29:04
ZombieConfer?
Bobby Garcia
29:20
just until oct 32
Bobby Garcia
29:22
31
Ryan Mock
29:40
im here
Sam Perez
29:48
sam I?
Jacobs Otto
29:49
You know it Mike
Sam Perez
30:00
oh yeah sorry
Joseph Calcagno
32:45
oh geez lol
Edgar Austodillo
33:11
RIP in peace us
Alejandro Jara
33:44
No dont show it
Joseph Calcagno
33:53
my power settings kicked in during recording hahah
Jacobs Otto
40:29
Good job guys!
Sam Perez
40:35
great vid
Joseph Calcagno
44:46
sweet
Kevin Cameron
44:53
Yeah, good job!
Sam Perez
45:02
the music was eerie and fit the tone of the dark world of identity theft
Joseph Calcagno
45:46
was there someone typing in the background
Joseph Calcagno
45:59
music
Joseph Calcagno
52:07
accuracy and integrity
Joseph Calcagno
54:18
first one is weighed
Bruce Hartman
54:34
the ddos answer was availability
Bruce Hartman
54:54
unequivically
Bobby Garcia
55:47
utility has lost it's usefulness
Jacobs Otto
56:12
Shit my kitchen is flooding
Ivers Spivey
59:45
lol
Joseph Calcagno
01:00:26
mmm
kyle b
01:01:47
could you say that accuracy happens outside of the function and integrity happens within the function?
Joseph Calcagno
01:01:47
and affects the integrity of the data?
Ciaran Farley
01:01:48
so someone playing with a magnet a little too close to a hard drive could be a loss of accuracy ?
Joseph Calcagno
01:04:15
accuracy can affect integrity
Bobby Garcia
01:04:54
CIS54 NOOOOOOOOOOP
Bobby Garcia
01:05:28
i lost 20 lbs that semester
Ivers Spivey
01:05:57
O.O
Ryan Mock
01:06:36
those taquitos aren't that bad if you get them at the right time of day.
Joseph Calcagno
01:06:50
sodium yum
Joseph Calcagno
01:07:26
oh no
kyle b
01:11:06
integrity
Joseph Calcagno
01:11:12
untegrity
Bobby Garcia
01:11:13
loss of bass
kyle b
01:11:44
my ears say loss
kyle b
01:13:32
theres a filter for pops
Sam Strelitz
01:14:38
When someone figures out an attack?
Kevin Cameron
01:14:44
When the bad guys know about it.
Tony Farrell
01:14:48
when is beomes known
Edgar Austodillo
01:14:50
When attackers are aware of a vulnerability, it is an exposure
Joseph Calcagno
01:14:54
attacker identifies vulnerability
Bobby Garcia
01:14:56
^
Joseph Calcagno
01:15:41
disposal
Bobby Garcia
01:15:42
I heard it was Mike trying to make a point
Joseph Calcagno
01:18:00
probably
Ivers Spivey
01:18:17
date of birth social security
Joseph Calcagno
01:18:19
ssn is new material
Joseph Calcagno
01:18:26
news
Kevin Cameron
01:18:37
Oh horrors.
64rr377 60rd0n
01:18:52
how did eternal blue have anything to do with exfiltration? That's an encryption sploit?
Ivers Spivey
01:19:01
email name and password
Ivers Spivey
01:19:05
included
Joseph Calcagno
01:19:10
oh no just before the midterm
kyle b
01:19:10
they can use my print balance at the library!!!!
Ivers Spivey
01:19:19
lol
64rr377 60rd0n
01:20:08
FYI I got eternal blue running on WINE
Kevin Cameron
01:20:12
This is why we can't have nice things.
Bobby Garcia
01:20:36
lol
Joseph Calcagno
01:21:42
company integrity
Bobby Garcia
01:21:44
trumps will tweet keys by morning
Ciaran Farley
01:22:26
so the fact that my servers are running the default security settings was a vulnerability but now that ive told you its an exposure ?
Kevin Cameron
01:24:22
That's how the NSA lost their stuff in the first place.
Ciaran Farley
01:25:28
so are those key leaks how programs like microsoft toolkit trick windows into thinking its activated ?
Sam Strelitz
01:25:42
Does eternal blue leverage the old 'hack' where you'd do start->run and then type in "\\<hostname or ip\$c" to get read/write access to the C drive?
Joseph Calcagno
01:28:02
even if fracking can not sure if its intentional
Bobby Garcia
01:28:56
if I intentionally wanted to burn a tree outside and it fell on the 800 building and that bured down, was that unintentional? I didn't mean to
kyle b
01:29:20
backhoe
Joseph Calcagno
01:29:33
hard to prove a persons intention though
Ivers Spivey
01:29:43
intentinaly negligent
Ciaran Farley
01:30:27
a country testing a nuclear weapon and accidentailly making a giant emp that takes out the power grid would be ...?
Joseph Calcagno
01:30:41
indirect intentional attack?
Kevin Cameron
01:30:47
karma
Joseph Calcagno
01:32:38
depends on your intention
Ivers Spivey
01:33:34
stuxnet
Joseph Calcagno
01:34:19
they didnt have the policies in place to prevent that attack
Joseph Calcagno
01:35:25
to all employees do not plug in foreign devices lol
Ciaran Farley
01:40:32
my refrence is specificallty to in the show leverage, the cherecter hardison splices into an ethernet cable in the wall so he can watch teh security cameras to help the rest of the team not be seen
Joseph Calcagno
01:41:01
passive
Ivers Spivey
01:42:13
I just wathced a ducmentary about using a small device tapped into the wire and then using wirelss/radar to veiw the feed.
Bobby Garcia
01:42:49
plus the mic in the bag helped
Bobby Garcia
01:44:25
worm in a trojan horse that caused a virus
Bruce Hartman
01:48:34
http://news.mit.edu/2014/algorithm-recovers-speech-from-vibrations-0804
Bruce Hartman
01:48:57
Algorithm recovers speech from the vibrations of a potato-chip bag filmed through soundproof glass.
Unknown Speaker
00:00
Ciaran Farley
01:50:33
hey maybe after doing this project I can do the same thing to my servers to remove the exposure I talked about earlier
Bobby Garcia
01:51:39
make opus talk..
Ivers Spivey
01:52:53
wireless as well?
64rr377 60rd0n
01:53:12
lol i locked myself out of my home webdav by doing an openvas scan
Bobby Garcia
01:54:05
tell you where to find the cabrillo data
Bobby Garcia
01:56:31
white hat with Khakis?
Bobby Garcia
01:57:37
look. I found a power strip... expliot it
Bobby Garcia
01:58:22
a mysterious 4000W heater shows up
Kevin Cameron
01:58:39
What about road apples?
Ciaran Farley
01:58:44
carter could walk about with a couple pi's
Bobby Garcia
02:11:42
giving me an A will reduce your risk of loss
Sam Strelitz
02:12:08
If you increase his risk of loss, you might get an A.
Ciaran Farley
02:12:16
are we allowed to team with future students ?
Ciaran Farley
02:29:47
what is the job title we are immitating with this project ?
Ciaran Farley
02:34:31
I did the lab as a timeline going into each part of the breach and defining a mechanism used in each step instead of focusing on the first part was that ok? (i havent checked my grade yet)
kyle b
02:35:34
capec 137 - parameter injection
kyle b
02:35:42
was that not how they got in?
kyle b
02:37:11
ah ok
kyle b
02:37:37
i guess i just didn’t know where to stop on this data base
kyle b
02:37:41
it is a black hole
kyle b
02:43:57
thanks Mike@