DEFCON 18: Pwned By The Owner: What Happens When You Steal a Hackers Computer 1/2

DEFCON 18: Pwned By The Owner: What Happens When You Steal a Hackers Computer 1/2

Christiaan008

1 десятилетие назад

127,906 Просмотров

Speaker: Zoz

Having your place broken into and your computer stolen can be a nightmare. Getting revenge on the fucker who has your machine can be a dream come true. I had the opportunity to experience both of these when my machine was stolen in Boston and then showed up in Las Vegas 2 years later. Come share some laughs at a lamer's expense, participate in the pwnage, and learn some resulting insights into the implications of certain security decisions.

For presentations, whitepapers or audio version of the Defcon 18 presentations visit: http://defcon.org/html/links/dc-archives/dc-18-archive.html

Тэги:

#10 #defcon #061 #clip1
Ссылки и html тэги не поддерживаются


Комментарии:

A C
A C - 18.10.2023 19:40

The question I keep asking myself is how did he bypass user login? You would think someone with this setup would have changed around enough for a random technologically illiterate thief

Ответить
Golden Ratio
Golden Ratio - 28.01.2022 04:52

2022 here 🤣🤣🤣

Ответить
Old Cake
Old Cake - 09.12.2021 16:24

Everyone's hacking fantasy come to life lol

Ответить
Christel Treasure
Christel Treasure - 16.09.2021 10:05

Ye

Ответить
Varghalla
Varghalla - 25.07.2021 07:07

Still one of the greatest defcon talks to date.

Ответить
S Wester
S Wester - 11.06.2021 21:26

Tiger King when he was an it expert

Ответить
Bluedoor
Bluedoor - 07.10.2020 04:56

All these comments are over 7 years old, and I’m having too much fun reading them. 😂

Ответить
Solid_Fuel
Solid_Fuel - 29.05.2018 17:00

wow. back in 2010 we said "self portrait" instead of selfie....

Ответить
Jacno77
Jacno77 - 01.03.2017 22:48

man this guys a annoying nerd

Ответить
ouiouibcn
ouiouibcn - 10.06.2016 02:14

Can you Tell me how he did ssh his Mac ? He needed to open port 22 into the guy host router????

Ответить
oO0E
oO0E - 23.02.2015 23:17

I don't get how e originally found the thief.  Can someone explain?

Ответить
Erik K
Erik K - 22.02.2014 11:38

It's possible that this hacker is violating Guzman's privacy and wrongly damaging his reputation.

Why did this hacker assume the guy holding the computer was the actual thief? He might have simply bought the computer used, either from the thief or (more likely) from someone involved in fencing stolen goods.

Can we assume Guzman knew it's stolen? Maybe a seller on craigslist claimed to be a dealer of used computers, and told him that he would need to buy his own OS X install CDs, or just use the computer in its current state. Guzman might have been naive, and intimidated by the unfamiliar idea of an OS install, so he decided to just live with the computer as-is.

Are we supposed to believe Guzman previously lived near Boston, or traveled all the way from Las Vegas to Boston and back? This talk makes no mention about researching the guy's past living addresses.

I've bought used electronics before. So now I have to worry about strangers coming out of nowhere and sending cops after me? Then again, I guess any used smartphone or computer should be wiped out completely before first using it.

Ответить
alphabeta
alphabeta - 21.10.2013 20:34

Almost same story here : watch?v=OEYQKD_9QJ8

Ответить
Radex Mark
Radex Mark - 11.08.2013 22:51

I would like to speak to someone who can help me locate may Mac Book Pro 13 in Peru I have purchased a new 15 Ret but I wan to be able to find the person the next time it happens as I travel over seas for work in 3rd world countries were theft probabilities are high. [email protected] I already have a bios/firmware password. Encrypted Important info. I want to be able to install a program such as Prey, Lo Jack etc. inbedded micro chip would be ideal does it exist? Cost is not an issue.

Ответить
freedustin
freedustin - 15.06.2013 06:52

at this point, he stole your computer, then gave you his paypal account...just make him buy you a new computer. he owes you that much.

Ответить
Patrick Bateman
Patrick Bateman - 08.03.2013 13:31

It was connected to his VNC. He was basically able to retrieve all transmissions.

Ответить
Akath
Akath - 02.02.2013 05:18

Fuck you annotations

Ответить
Demicol
Demicol - 11.12.2012 23:10

See part 2

Ответить
llsa13
llsa13 - 28.11.2012 05:44

Video projects aka porn...

Ответить
Vermundo Sinbea
Vermundo Sinbea - 25.11.2012 22:51

how did he check browser cookies/history via ssh?

Ответить
Clueless Joe
Clueless Joe - 07.10.2012 19:02

Being a geek is so coooooool

Ответить
Mike Hunt
Mike Hunt - 09.01.2012 10:42

facebook: devinizmg melvin is still on facebook. lol

Ответить
Prasanna N
Prasanna N - 12.08.2011 22:07

I'm a wannabe hacker. And you are Inspiring!!!

Ответить
LagDragon
LagDragon - 17.06.2011 09:07

Nice!

Ответить
Green Silver
Green Silver - 02.06.2011 03:14

Hacking is now an act of war according to the Pentagon, so you guys better not hack your parents facebook accounts any more! XD

Ответить
Iuri Silva
Iuri Silva - 23.03.2011 01:50

BIGBUTTBRAZILIANMOMSDOTCOM

Ответить
Baxxter101
Baxxter101 - 10.03.2011 02:26

hahahaha epic win dude!

Ответить
daavq
daavq - 08.03.2011 00:30

OMG this scares me. I will need to clean my porn folder!

Ответить
lostwhirley
lostwhirley - 08.03.2011 00:14

THIS IS AWESOME !!! FAIL ON THIEF !!!

Ответить
Gameboygenius
Gameboygenius - 18.12.2010 05:47

Oh, the win!

Ответить
Neolasi
Neolasi - 27.10.2010 00:50

Nice Talk!

Ответить