Transcript – Top Hacker Shows Us How It’s Done by Pablos Holman at TEDxMidwest
Right click to download the audio:
Pablos Holman – Futurist, inventor, and digital security expert
So this is a hotel room, kind of like the one I’m staying in. I get board sometimes. A room like this has not a lot to offer for entertainment. But for a hacker, it gets a little interesting because that television is not like the television in your home, it’s a node on a network. Right? That means I can mess with it. If I plug a little device like this into my computer, it’s an infrared transceiver, I can send the codes that the TV remote might send and some other codes.
So what? Well, I can watch movies for free. That doesn’t matter to me so much, but I can play video games too.
Hey, but what’s this? I can not only do this for my TV in my hotel room, I can control your TV in your hotel room. So I can watch you if you’re checking out with one of these, you know, TV based registration things, if you’re surfing the web on your hotel TV, I can watch you do it. Sometimes it’s interesting stuff. Funds transfer. Really big funds transfers. You never know what people might want to do while they’re surfing the web from their hotel room.
The point is I get to decide if you’re watching Disney or porn tonight. Anybody else staying at the Affinia hotel?
This is a project I worked on when we were trying to figure out the security properties of wireless networks; it’s called the Hackerbot. This is a robot we’ve built that can drive around and find Wi-Fi users, drive up to them and show them their passwords on the screen.
We just wanted to build a robot, but we didn’t know what to make it do, so — We made the pistol version of the same thing. This is called the Sniper Yagi. It’s for your long-range password sniffing action, about a mile away I can watch your wireless network.
This is a project I worked on with Ben Laurie to show passive surveillance. So what it is, is a map of the conference called Computers, Freedom and Privacy. And this conference was in a hotel, and what we did is we, you know, put a computer in each room of the conference that logged all the Bluetooth traffic. So as everybody came and went with their phones and laptops we were able to just log that, correlate it, and then I can print out a map like this for everybody at the conference.
This is Kim Cameron, the Chief Privacy Architect at Microsoft. Unbeknownst to him, I got to see everywhere he went. And I can correlate this and show who he hangs out with (phone dialing) when he got board, (phone dialing) hangs out in the lobby with somebody. Anybody here use cellphones?
So my phone is calling–
Voice mail: You have 100 messages.
Pablos Holman: Uh oh!
Voice mail: First unheard message —
Pablos Holman: Where do I press —
Voice mail: Message skipped. First skipped message.
Pablos Holman: Uh oh!
Voice mail: Main menu. To listen to your– You have pressed an incorrect key — You have two skipped messages. Three saved messages. Goodbye.
Pablos Holman: Uh oh! So we’re in Brad’s voice mail. And I was going to record him a new message, but I seem to have pressed an invalid key, so we’re going to move on. And I’ll explain how that works some other day because we’re short on time.
Anybody here used MySpace? MySpace users? Oh! Used to be popular. It’s kind of like Facebook. This guy, a buddy of ours Samy, was trying to meet chicks on MySpace which I think is what it used to be good for. And what he did is he had a page on MySpace about him. It lists all your friends, and that’s how you know somebody’s cool is that they have a lot of friends on MySpace.
But then it would copy that code onto your page, so that whenever anybody looked at your page it would automatically add them as Samy’s friend too. And it would change your page to say that “Samy is your hero.” So in under 24 hours, Samy had over a million friends on MySpace. Hey, he just finished serving 3-years probation for that.
Even better, Christopher Abad, this guy, another hacker, also trying to meet chicks on MySpace but having spotty results. Some of these dates didn’t work out so well, so what Abad did is he wrote a little bit of code to connect MySpace to Spam Assassin, which is an open source spam filter. It works just like the spam filter in your email. You train it by giving it some spam, train it by giving it a little bit of legitimate email, and it tries to use artificial intelligence to work out the difference. Right?
Well, he just trained it on profiles from girls he dated and liked as legitimate email. Profiles from girls he dated and not liked, as spam, and then ran it against every profile on MySpace. Out spits girls you might like to date. What I say about Abad is, I think, there’s like three startups here. I don’t know why we need Match.com, when we can have Spam dating? You know this is innovation. He’s got a problem, he found a solution.
Does anybody use these — bleep — keys for opening your car remotely? They’re popular in, well, maybe not Chicago, Okay. So kids these days will drive through a Wal-Mart parking lot clicking open, open, open, bloop. Eventually you find another Jetta or whatever just like yours, maybe a different color, that uses the same key code. Kids will just loot it, lock it up and go. Your insurance company will roll over on you because there’s no evidence of a break-in. For one manufacturer we figured out how to manipulate that key so that it will open every car from that manufacturer. There is a point to be made about this which I barely have time for, but it’s that your car is now a PC, your phone is also a PC, your toaster, if it is not a PC, soon will be. Right? And I’m not joking about that.
And the point of that is that when that happens you inherit all the security properties and problems of PCs. And we have a lot of them. So keep that in mind, we can talk more about that later. Anybody use a lock like this on your front door? Okay, good. I do too.
This is a Schlage lock. It’s on half of the front doors in America. I brought one to show you. So this is my Schlage lock. This is a key that fits the lock, but isn’t cut right, so it won’t turn it. Anybody here ever tried to pick locks with tools like this? All right, got a few, few nefarious lock pickers. Well, it’s for kids with OCD. You’ve got to put them in there, and finick with them, spend hours getting the finesse down to manipulate the pins. You know, for the ADD kids in the house there’s an easier way. I put my little magic key in here, and put a little pressure on there to turn it, smack it a few times with this special mallet and I just picked the lock. We’re in. It’s easy.
And in fact, I don’t really know much more about this than you do. It’s really, really easy. I have a keychain I made of the same kind of key for every other lock in America. And if you’re interested, I bought a key machine so that I can cut these keys and I made some for all of you guys. So my gift to you, come afterwards and I will show you how to pick a lock and give you one of these keys you can take home and try it on your door.
Anybody used these USB thumb drives? Yeah, print my Word document, yeah! They’re very popular. Mine works kind of like yours. You can print my Word document for me. But while you’re doing that, invisibly and magically in the background it’s just making a handy backup of your My Documents folder, and your browser history and cookies and your registry and password database, and all the things that you might need someday if you have a problem. So we just like to make these things and litter them around at conferences.
Pages: 1 2