For an actual talk to be recorded, with screens, and podium you would need three cameras. Two of the cameras will be located in the near middle of the venue, and the third on a free cam near the stage. This would allow the video editor to make a pretty solid show of this.
Ryan N exactly my thoughts.. not only the cammera work was bad, but I'm not sure why they needed the first guy to "present" Mitnick & even ask him questions.. obviouslly Mitnick does seminars & know how to present without anyone holding his hand..
Well he is dead now, plus he is a grifter. Stole all sorta shit and took credit for it.. his usb ninja was literally a product stolen from by buddy MG... KEVIN asked MG to MAKE him a cable that he could then go use at a talk to look like mr hackerman. MG was too trusting and showed him the internals. Next thing you know kevin is selling it as usb ninja saying it was all his with the help of vincent of vysecurity, go look at OMG cable and demonseed then go look at usbninja. Kevin then went on the defensive and attacked and literally tried getting ppl fired from their jobs for posting shit proving all this. Any real hacker knows this and doesnt like him except a very few. And corp c suite guys that are easy to trick with "computer hacks" and thought he was a genius
There's a lot of comments criticizing the cameraman for not showing the screen. There's a reason for this. Up until Kevin started discussing the Wannacry cryptoworm attack, he was using and covering information largely based on an individual's key card from the audience. Although Kevin verbally says what he sees on the card, the cameraman wasn't going to post any or all of the information shown on the screen while the individual's personal work security was being discussed. Seems silly in a way, but we can thank all of the sharks for making our world the way it is.
The cameraman may NOT be dumb. During this presentation one cameraman may have been filming this guy and then for the visuals, they use an application to switch to the screen the speaker is showing while the cameraman stays on the speaker for an easy switch back. Then perhaps this was put to RU-vid as an afterthought. The cameraman was probably doing a good job for his live work.
Direct quote from Mitnick@ 21:27: "We could bypass any, what we call, PSP - personal security products.It doesn't matter what AV it is, it could be bypassed."
Yes he's very good at his social engineering isn't he? A charlatan, a fraud, an idiot who had already been arrested once before and then got caught again.
Thank you for mentioning an outbound firewall, they're so underrated. While a outbound firewall isn't as easy to impliment as an inbound firewall it can be extremely effective at preventing infected servers from connecting to C&C servers and even preventing RCE vulnerabilities such as log4shell. You'd ideally want to impliment an IP whitelist which will give you the best protection, although this is difficult to impliment it is very doable on servers. Many firewall appliances will typically have an IP blocklist, and while they're great at blocking known bad actor, at it's core it's simply enumerating badness. You can't make a list of every single known piece of malicious software or IP address.
The first time I read about Kevin Mitnick was in 1988-89 in a book about hackers I remember back then I was 19yrs old and thought Kevin was a hacker god...now all these years later...back then I vaguely followed him in that my parents house was raided and prosecuted by the feds for accessing and attempting to access a federal computer (all with a 2400 baud rate modem) without authorization back in the late 80's when the laws were just starting to be put down in the books as far as computer crimes...now for the same thing I would have been sent to prison for some time.. Yes Kevin is somewhat of a living legend and a hero in the computer security and hacker world.
No he wasnt he was a lying grifter who stole others work. Only a few ppl liked him all the real hackers knew this and couldnt stand his fraud ass bs. His usb ninja was actually stolen from MG (omg cable, demonseed) go research. Never Meet Your Heroes...
*kevin mitnick* points at screen to show something *cameraman* Zooming in on kevin *kevin mitnick* Takes out a laser pointer and points on screen *cameraman* Zooms in even more on kevin *kevin mitnick* Yells " This is the most important part of the presentation you better look at this! " *cameraman* Zooms in on kevin's eyeballs
I think you misuse the words "even though". I would imagine if you knew everything, no one could seem interesting or tell you anything interesting. So it just makes sense when you hear someone speaking, you immediately become interested, much less this guy
Even though can not meet this used to be dangerous but now turned into the chief hitech police, but being shared a learning video like this is quite something. Thank you, Stu.
If you have an understanding of ethical hacking, you don't need to see the screen to know what he's doing. If you don't have any knowledge of ethical hacking, you also don't need to see his screen for the opposite reason. The cameraman did his job well. Kevin was showing IT professionals things they need to look out for. Us on youtube don't need to see that kind of thing; that's the purpose of ethical hacking is to prevent wandering eyes and destructive behaviours. If you want to see what he did, then open a book or two and read into it.
Nope a true fraud. A grifter, real hackers hated him. Cause he would steal our work and claim it as his own to look like a genius hackerman. He understood very basic shit and relied on others to do the heavy lifting while taking all the credit fuck kevin mitdick
My husband (who passed away) knew how to do more than some techniques of hacking, ( and I was a dumb kid in my 20s and not as amazed as I should have been). How I now wish I had asked him to teach me things¡! He was amazing.
Kevin.. I hope your hacking into this realm from where you are and read this comment…. Rest in Peace. You are my idol. I learned so so much from you. I enjoyed all your books. I’m actually going to re-read them again to pay respect to you, Sir. The hacker community will miss you. We love you.
Everybody keeps trashing the camera man, but he probably was doing his job just fine, and another camera had a permanent shot of the screen. We just don’t get to see it in this video edit.
You really believe that. Too long to explain it and your just throwing it out there ‘not to join the sheep ‘. You just ended up with other sheep. It’s single camera. 0 editing. Just a bad camera operator. It’s not professional. Very amateurish.
@@bobjamesjames1612 Well, you gotta remember, you tube is getting really strict on hacking and other idiotic things in there TOS. You should read it sometime. lol
This was a great video. Its very unerving knowing hackers can access our electronic devices so easily. My phone and laptop were hacked last year, and this just added to my paranoia.
This feels surreal. I remember watching this video vividly. This was the guy that first got me interested in hacking! RIP Kevin. Still remember the story of how he hacked into the fbi phone system to this day! What a legend.
You tend to gain weight fast after leaving prison --- you go from eating shitty food that you end up puking into your toilet --- to eating whatever you want in the outside world --- can't blame him for 20 years of enjoying freedom
Probably because the US government made an example out of him. For his second time of being caught. If your friends thought he was good at anything other than lying/deception they were deceived by him too. Quite amusing actually.
Kelvin talks about pdf containing malware/ransomware and what harm it could do (like wannacry) but how do we prevent this from happening? Not download any pdf files? Obviously, this isn't an option. Did I miss something?
20:51 Yes because windows 10 would stop an unsigned device driver from loading by DSE and if it has been signed then you know the person/company who wrote it, unless it was a stolen/leaked certificate.
interesting thought there. however its very possible to create a certificate, you already have access to multiple legit certificates on your devices that you can reverse engineer and get legit points of verification to add into a personal certificate and make it look valid
The only reason I clicked "dislike" button is because of the cameraman... What's the point of showing Mr Mitnick and none of his hacks? You should be sacked as a cameraman...
I share the same feeling, then I thought maybe he realized he would get in trouble for posting this online ( which we don't know, yet people makinjudgement here about him, anyway)..
@@hariomsingh0307 look up the USB Ninja, and OMG cable. He had my friend build him this cable so he could use it at a talk for c suite execs (and claim as his own) MG had been working on HID based implants for a while, and was about to release OMG cable. Well he was too trusting and shared the internals of it with kevin, kevin then shared them with vincent of vysecurity and the two started mass producing them and selling them as usbninja saying it was all their idea. But it wasnt, it was all stolen from MG. It used the same internals as MGs OMG cable... he did this kinds shit his entire career. He would take 0days and custom payloads and present them at talks, too create the effect he is some genius, he isnt.. even his early days all his social engineering tricks he got them off hacker bbs's in the 90s. He was a charlatan
@@hariomsingh0307 he also tricked a lot of real hackers that to this day defend him. Cause they thought all his 0days and payloads, and knowledge was really his, but no, he was legit taking them from ppl smarter than him that just had no clout in the industry. MG released all their private texts proving kevin and vincent stole everything too. And numerous other ppl started doing the same.. he blocked all hackers on twitter who called him out and posted proof of it.. he even tried getting my friends fired from their infosec jobs by doxing them and calling their corps HR dept claiming harrasment.. kevin used his clout(built on lies) to shut up ppl not as known, and therefore not as "powerful" as him
Mitnick never changed while presenting this. I saw him the first few seconds. He remained the same. The screen over his head showed what mattered, but apparently the tripod of the camera was broken?
what if they make those access cards to have button you have to press to activate that rfid (or whatefer its called) to finish the circuit, if not pressed its offline/inactive even its passive is disabled, all you have to do as customer is to proxy card to reader and press button, no big deal in terms of usefullness but makes you safe from passive reading, only way to clone it would be to "can I see it? and then press button" what coud be countered by teaching owners of cards to have a look on people pressing this button once you show them card or dont let een your spouse touch it, (your wife/housband still can touch it once you are in restroom or asleep but.... you cant defend against it anyway
Bro ur password are save in their servers in a hash algorithmic form not in na text form if u got tat hash form of password just decrypt it and there u got ur password
Yes, they are encrypted, and I would assume (I don't know this myself off the top of my head) that the keys are stored in a manner where Mozilla doesn't have access to them, since the people at Mozilla are generally competent.
Everybody hating on the cameraperson, maybe the screens were supposed to be captured from the video out of his setup but this somehow didn't work or something? I mean filming the projection looks crappy, so it would make sense to switch back and forth. Just saying.