Hacker Answers Penetration Test Questions From Twitter | Tech Support | WIRED

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 1,9 тис.

  • @lameware
    @lameware Рік тому +6708

    "Every employee is part of the security team" -- This is such a good take. I wish I could get my coworkers to understand this.

    • @bpb210
      @bpb210 Рік тому +79

      But how do you motivate completely uninterested employees to learn about IT security? (Assuming management is also just as uninterested.)

    • @JeremyShawaf-s6p
      @JeremyShawaf-s6p Рік тому +11

      I certainly sense no interest assuming management spoke up.

    • @embersaffron5522
      @embersaffron5522 Рік тому +130

      They probably don't get paid enough to care about their normal job, let alone security

    • @TheGuy3-D
      @TheGuy3-D Рік тому

      ​@@bpb210It's a culture thing. My team sends out pretty regular phishing tests via email that we send to specific departments, or all employees.

    • @One.Zero.One101
      @One.Zero.One101 Рік тому +1

      🔖Nah man, humans are just too stůpid. In my country, everyday we got dozens of warnings about text scams and everyday hundreds of people still fall victim. Humans have been getting scammed since the caveman days and they'll still get scammed til eternity, the technology just changes but the scams stay the same. MLM scams today are just modern variations of investment scams in the early 1900s.

  • @faithblack3851
    @faithblack3851 Рік тому +1866

    Its amazing how much hacking occurs just by asking nicely.

    • @BlueProphet7
      @BlueProphet7 Рік тому +114

      Yep - most people think they are excellent judges of character, and when someone acts professional and polite while asking them for a simple innocent favor.... problems occur.

    • @sigmascrub
      @sigmascrub 11 місяців тому +52

      Not just hacking. A lot of crime is committed that way.

    • @paulb4334
      @paulb4334 10 місяців тому +33

      We think Ants are simple creatures. They trust everthing that carries a specific pheromone. In a corporate environment that's a badge and maybe a clipboard :)

    • @omarjimenezromero3463
      @omarjimenezromero3463 9 місяців тому +9

      almost every person want so act superior or feel superior, so if you act politely and as a newby looking for new things, you most probably are going to bypass a lot of human security because of that, it is something that sadly had happen to me some times i lost myself in a place, i usually end up with the staff at the staff side like a rookie, until they see that i am not of the staff and i am only lost, but at that point i am some steps of their boss, their servers or close/in to some critical building XD.

    • @Zevilon05
      @Zevilon05 8 місяців тому +8

      It’s not necessarily being a bad judge of character. Psychologically, humans inherently want to trust their fellow humans. Unfortunately, that opens the door for people to get taken advantage of.

  • @swankeepers
    @swankeepers Рік тому +3762

    As has often been said, the defenders (blue team) have to get it right every single time. The attackers (red team) only have to get it right once.

    • @basse889990
      @basse889990 Рік тому +151

      True, until the attackers get inside. Then they have to get it right each time to not get caught. They just need to make a single mistake to get caught by the blue team

    • @iagmusicandflying
      @iagmusicandflying Рік тому

      @@basse889990 Truth. Makes my job much easier when your average hacker's first thought is "I'll start a cryptominer!".

    • @Thomas0x00
      @Thomas0x00 Рік тому +52

      @@basse889990 facts. But sadly I have often seen that eventho blue teams are able to detect, rapid containment can be incredible hard.

    • @benhook1013
      @benhook1013 Рік тому +1

      @@basse889990 again still much easier, its not the case that any single mistake will get them alerted. In some environments, monitoring may never pick up the attack happened, and companies only know when the data gets released or sent a ransom (this happens a lot...). Blue team has a much harder job every single time.

    • @sebastiang7394
      @sebastiang7394 Рік тому +40

      That’s not entirely true. Any bigger company will have multiple layers of defence. So you get through one you might get stopped on the next level. It’s usually also just about making it uneconomical to attack you. It’s like bicycle locks. There isn’t a lock that can’t be broken open in a few seconds if you have the right tools. Still if you want to protect your bicycle a bike lock is a very useful tool and if the bike next to you has a shittier lock it’s likely that bike will be stolen before yours.

  • @greatday19
    @greatday19 Місяць тому +73

    A pen testing attack vector I heard about recently: the pen testers had set up a booth selling some kind of drink or snack right in front of the target company with a promotional sign: Scan your badge and see if you qualify for a discount!
    Apparently people were handing over the badge credentials in troves...

  • @frandeep
    @frandeep Рік тому +5566

    This guy communicates! Short and concise. Also...Wired...Give your editors a raise. They rule.

    • @Zero.0ne.
      @Zero.0ne. Рік тому +72

      Wired Support is one of the best things on the internet. I think everything about it is perfect and I hope they never change it.

    • @Snarethedrummer
      @Snarethedrummer Рік тому +10

      He's busy! Got things to do, companies to destroy...
      (or help, as this case may be).

    • @kelseykreppel
      @kelseykreppel Рік тому +2

      Yes this!!

    • @odorlessflavorless
      @odorlessflavorless Рік тому +13

      become a CEO before asking other companies to give them the raise.

    • @JacquelineHD2827
      @JacquelineHD2827 Рік тому +2

      I think he should do a whole series on how us mere commoners can better protect our S!

  • @callumb4980
    @callumb4980 Рік тому +226

    Why do all pen-testers look like they were kicked through the Las Vegas strip

    • @SobeCrunkMonster
      @SobeCrunkMonster 7 місяців тому +1

      great way to describe it lol

    • @uuuultra
      @uuuultra 6 місяців тому +1

      through?

    • @hdtv2296
      @hdtv2296 6 місяців тому +31

      Because defcon (big hacking convention) is in las vegas

    • @factorfitness3713
      @factorfitness3713 4 місяці тому +4

      They were?

    • @jonwhite549
      @jonwhite549 4 місяці тому +1

      A lot of them live in vegas

  • @AndorranStairway
    @AndorranStairway Рік тому +1662

    His hot take is 100% accurate. Phishing is by far the most popular and effective way to penetrate an environment. It is far more tedious and cumbersome to develop sophisticated malware than it is to get an ignorant person to scan a QR code.
    If everyone developed basic knowledge on how to identify phishing emails, there would likely be over a 90% reduction in cyber crime out there.

    • @gman4141007
      @gman4141007 Рік тому +63

      Im so happy seeing someone say this. I've been saying the same thing every time something gets "hacked." i don't even call phishing hacking because it's more like a scam.

    • @benhook1013
      @benhook1013 Рік тому +4

      Ah you again pretending to know what your talking about. Hot take, huh? This line has been said and has remained true for over 10 years, if anything thinks this is new information you truly have no idea about IT security. (which makes sense give your other inane comments trying to call out other people)

    • @AndorranStairway
      @AndorranStairway Рік тому +75

      @@benhook1013 yeah I do know what I’m talking about since I hold both CISSP and OSCP. All I did was agree with his statement, but you went on a tangent about “new information”, which I never said it was. I’m guessing you’re just an internet rando “IT security” or sysadmin wannabe who thinks using wireshark makes him Mr Robot? 😂🤡

    • @darksnow1111
      @darksnow1111 Рік тому +1

      ​@@benhook1013 Is your iq low or are you simply ignorant?

    • @Skank_and_Gutterboy
      @Skank_and_Gutterboy Рік тому +8

      Yep, scan a QR code or click a link that says, "Click here to learn how to avoid scams..."

  • @seclilc
    @seclilc 11 місяців тому +45

    I know Jayson personally, and he’s just an incredible human. So happy to see him here ❤

  • @christatum
    @christatum Рік тому +3478

    It always scares me how little we, the average non-tech people, actually know about all this stuff

    • @A-JAM75
      @A-JAM75 Рік тому +97

      I didn't understand a single word he said lol

    • @timmyd3819
      @timmyd3819 Рік тому +358

      As a software engineer, you have no idea. It's only getting worse too. Due to the user friendliness of modern day technology (think today's iPhone vs Windows XP) users are required to know less and less about their technology because it "just works". Combine that with the Internet of Things, that so many devices connect to the internet, that even hacking someone's Wifi toaster could be a dangerous exploit in the wrong hands because that gave them access to everything on your network.

    • @Noise_floorxx
      @Noise_floorxx Рік тому +17

      True. I know the bare minimum but I don't trust much so that helps.

    • @One.Zero.One101
      @One.Zero.One101 Рік тому +1

      99% of people use the same username and passwords for all sites and they don't use two-factor authentication. I'm a computer programmer and a hobbyist hacker and I can into people's Instagram and Facebook accounts. There are professional hackers out there that are 100 times better than me. Yeah that's a scary thought.

    • @o1-preview
      @o1-preview Рік тому +7

      with great power comes great responsibility.

  • @ladvargleinad7566
    @ladvargleinad7566 Рік тому +1126

    He is not a pen tester, he is a full-blown secret agent.

    • @towermonkey5563
      @towermonkey5563 9 місяців тому

      Ummm, what do you think pen testing is? It's all corporate espionage or defense against it. Secret agent literally by definition.

    • @LeoNidasPlayForFun
      @LeoNidasPlayForFun 9 місяців тому +19

      Agree! The eyebrows give him away...

    • @Zevilon05
      @Zevilon05 8 місяців тому +7

      Bond.. James Bond

    • @brodude7194
      @brodude7194 6 місяців тому +12

      This "kind" of hacking is actually called Social Engineering, the reconnaissance part the guy was talking about. Look it up

    • @manilkasheran2934
      @manilkasheran2934 5 місяців тому +3

      @@Zevilon05 James Blonde?

  • @Skooozle
    @Skooozle Рік тому +513

    I love that his job title on his Microsoft badge is "hacker".

    • @GeekGamer666
      @GeekGamer666 10 місяців тому +33

      Didn't even look at that, that's hilarious.

    • @et9120
      @et9120 10 місяців тому +74

      ​@@GeekGamer666 yep, and that's the lesson, most people aren't actually checking.

    • @benoitbvg2888
      @benoitbvg2888 9 місяців тому +3

      ...but he presents himself as a "penetration tester"...

    • @ThePlayerOfGames
      @ThePlayerOfGames 9 місяців тому

      ​@@benoitbvg2888 watch Jayson E Street's DEFCON presentations, as they've said above; many peeps are only looking at the surface level without even properly seeing what's in front of them

    • @omarjimenezromero3463
      @omarjimenezromero3463 9 місяців тому +8

      @@benoitbvg2888 how much people know what a "penetration tester" do? and how much people only assume that is a thing of informatics wich they do not want to talk?

  • @isabellek1692
    @isabellek1692 Рік тому +194

    If this guy had an internship or some certification program I would 10000% sign up for his program

    • @Optable
      @Optable 3 місяці тому +1

      There's numerous. I recommend OccupyTheWeb's courses and books. Check out their website

  • @humane123
    @humane123 Рік тому +1548

    I am a security engineer and I loved every bit of this video.

    • @sreyashkanjilal4929
      @sreyashkanjilal4929 Рік тому +4

      hey , i really want to know something. Can you tell the process to become a penetration test/ hacker ??

    • @matt8239
      @matt8239 Рік тому

      Skillset. Learn as much as you can and get good at it. @@sreyashkanjilal4929

    • @danny9350
      @danny9350 Рік тому

      ​@sreyashkanjilal4929 Learn I.T. Helpdesk and Networking first. Then pivot into focusing on network security.
      Security gigs are an "after 5-10 years of experience" career.

    • @duplicake4054
      @duplicake4054 Рік тому +3

      Me too! I'm an ethical hacker/pentester

    • @JimBob1937
      @JimBob1937 Рік тому +2

      @@sreyashkanjilal4929 , nope, that's not a youtube block, I think it's a person removing replies, curious if the channel moderator is removing such posts.

  • @bulwulffcristole3235
    @bulwulffcristole3235 Рік тому +46

    I'm CEH/OSCP myself and I have to say the information that was put out here is awesome. Way to go, and very well articulated. Lots to learn for those willing to - keep it up!

  • @isaacheng6898
    @isaacheng6898 Рік тому +571

    I'm in college for cybersecurity engineering right now and this video was great, this guy explains a lot of these concepts very well for people who aren't familiar with the field

    • @mattc9598
      @mattc9598 Рік тому +2

      what are the requirements for getting into that field? I understand hardware far better than software, can barely code without using AI, but have thought about it. My local college says you need an degree in IT first, but they don't offer that sadly

    • @warlock8593
      @warlock8593 Рік тому

      ​@@mattc9598don't worry about the degree nonsense. You can learn software Online. You will be confused at first, but don't worry. Just use online resources.

    • @Kokose
      @Kokose Рік тому

      ​@@mattc9598 interest in the field, mostly. As long as you're passionate you don't even need university to start as an analyst, I highly recommend researching certificates and requirements and just studying for those.

    • @RealWorldMaverick
      @RealWorldMaverick Рік тому +3

      ​@mattc9598 what field exactly? It? Engineering? IT is very broad so if you can provide some additional information I may be able to point you in the right direction. What stuff are you interested in?

    • @pin65371
      @pin65371 Рік тому

      @@RealWorldMaverick exactly.. you dont really need a degree or even much technical knowledge to get into penetration testing. That is part of it but there are also people that specialize in the social engineering side of things. I would love to get into physical penetration testing. I listen to Darknet Diaries and that side of things honestly seems like a fun job. You are getting paid to get access to buildings and areas you shouldnt have access to.

  • @supremeleaderkoko
    @supremeleaderkoko Рік тому +49

    More of this guy please. This stuff is so prevalent nowadays

  • @Ultr4l0f
    @Ultr4l0f Рік тому +302

    Talked to a guy in IT connected to banks.
    The hackers can scope people so well.
    A CEO had his kid at a school. A major incident happened at that school. Within less than an hour they had sent a very official looking e-mail to the CEO with a link, that they said was for more information about the schools reaction amd which children were affected.
    So they had scouter the CEO and his family, and set alerts to if media wrote anything about things such as the childs school.
    Kinda scary

    • @lollubrick
      @lollubrick Рік тому +15

      or they played a role in whatever happened

    • @KMKZE-ho5wk
      @KMKZE-ho5wk 9 місяців тому

      I worked at a high class hotel for some time and had to prepare a report where I wrote everything down I could find on the internet about our guests. You wouldn't believe how much info you get about millionaires/billionaires, just by googling them.

  • @perrodetokio
    @perrodetokio 3 місяці тому +36

    This expert is both the stereotype of a hacker and a counterstereotype of how pop culture imagines a hacker. Love it!

  • @Sonicgott
    @Sonicgott Рік тому +257

    Even as a computer professional, and computer sales person for over 20 years, this video is still quite informative. Take the heart the information this gentleman has posted. It could save you and your company a lot of time.

  • @iainh
    @iainh Рік тому +353

    5:25 - The envelope trick is amazing, that's one I'd not considered before. I try to be as security conscious as possible, but I think I'd have fallen for that.

    • @ShawnFumo
      @ShawnFumo Рік тому +43

      Yeah stuff like that and the email to the CEO about the conference are very scary. Not falling for random phishing attacks it one thing, but we usually aren't expecting anything that is more targeted.

    • @spg1794
      @spg1794 11 місяців тому +1

      - im sure that worked like a charm 20 years ago. these days a security camera will ID you dropping a weird envelope on the desk and the FBI will be at your door 5am ready to take you and all your computer crap down to the field office😅

    • @Roccondil
      @Roccondil 11 місяців тому +28

      Unless of course company execs don’t want a security cam in their office. IT and the security team might also not want cams in offices on the offchance the system gets compromised and now the intruders get unrestricted access to things they just need to lie low and wait around for. Bonus points if the surveillance system also includes audio.

    • @omegagilgamesh
      @omegagilgamesh 9 місяців тому +15

      ​@spg1794 Not all places that need good security have good security. Don't forget, leaders of companies are people, and people can be extremely stupid. That security breach that happened a few years ago with EA where hundreds of thousands of gamers' personal information was compromised? That was just a series of phone calls to get that information, and six months earlier guys like this dude told the CEO and Board that this was an extremely dangerous flaw, and they did nothing about it.

    • @tomlxyz
      @tomlxyz 7 місяців тому +2

      ​@@spg1794 even if they do get caught doesn't mean there won't be damages

  • @KarmaK1984
    @KarmaK1984 9 місяців тому +6

    I’m not in the field of IT and watched this out of curiosity. He explained things so well and I understood a lot more than I thought I would! Really interesting!

  • @colinprincipe6293
    @colinprincipe6293 Рік тому +193

    I think the reason why email continues to be such an effective vector for attacks is because of the sheer volume of email people receive in a day. Especially in large companies where everyone is copied on everything

    • @onkelpappkov2666
      @onkelpappkov2666 Рік тому +27

      That is way too true. And then among all the clutter, someone sends a message about registering on a 3rd party website with your internal password, which you competently identify as an obvious phishing attempt, hah!
      Only to find out it was actually your boss and he actually wants you to do that and he tells you in person, completely oblivious about everything.

    • @mikeconleyphotography
      @mikeconleyphotography Рік тому +12

      The reason is HTML email, which effectively hides what’s actually in the message data. Links are disguised and lead to bogus sites. Another disaster we can thank Microsoft for.

    • @Triple_J.1
      @Triple_J.1 20 днів тому

      De activate all emails. Use Office 360/Teams. It is end to end.

  • @baller4life395
    @baller4life395 Рік тому +21

    Need more of this! Definitely my favorite speaker and content thus far. Educational and entertaining

  • @EK-saltybich
    @EK-saltybich Рік тому +723

    This guy is great. I'd love for him to return with more QA!

    • @johnmiller9931
      @johnmiller9931 Рік тому +33

      He's a very well-known name in the space. If you search his name on UA-cam, you will find tons of speaking events that he's done over the years. It'll keep you busy for a while.

    • @EK-saltybich
      @EK-saltybich Рік тому

      Oh man, you right. I'm about to binge right now lol. Thanks, @@johnmiller9931

    • @ulalaFrugilega
      @ulalaFrugilega Рік тому

      @@johnmiller9931thx!

    • @zephyrp8836
      @zephyrp8836 9 місяців тому

      Hes done presentations at Defcon, he's very entertaining

    • @yasirhashmi165
      @yasirhashmi165 7 місяців тому +1

      WHT is his name

  • @M1NML
    @M1NML Рік тому +14

    This was spectacular. The way Jayson communicates shows his mastery over the subject

  • @HoldFastFilms
    @HoldFastFilms Рік тому +325

    One time I had to argue with my manager that the request to provide server credentials to a vendor is 100% a pen-test and I was not going to oblige. We argued for days over it and I did not budge and of course it turns out it was a pen-test. Sadly, this was in an IT department and IT management is pretty clueless when it comes to this and just "want things done".

    • @LivingGuy484
      @LivingGuy484 Рік тому +47

      You definitely could have rubbed that in their face, great job!

    • @One.Zero.One101
      @One.Zero.One101 Рік тому +42

      Not knowing technology is one thing, but people who brag about being computer illiterate is another thing. They lash out at people helping them with security advice. I see it everyday on Reddit; *"I don't need your security advice! I don't believe in this computer mumbo jumbo! I don't believe in all these threats! You people are just being paranoid!".*

    • @JJs_playground
      @JJs_playground Рік тому +21

      Did you get promoted?

    • @Peacekeeper_84
      @Peacekeeper_84 Рік тому +39

      Is kinda sad and pathetic that some IT managers have 0 knowledge of basic cyber security measures

    • @onkelpappkov2666
      @onkelpappkov2666 Рік тому +4

      ​@@Peacekeeper_84The Jen Barbers of the IT world. People persons.

  • @labelleza211980
    @labelleza211980 Рік тому +7

    I'm still amazed on how this guy can articulate all this information for anyone to understand!

  • @Imshady69
    @Imshady69 Рік тому +189

    I was an IT Security Admin for a big restaurant group. We had to go through PEN testing every year. I don't miss it one bit

    • @sreyashkanjilal4929
      @sreyashkanjilal4929 Рік тому +1

      hey , i really want to know something. Can you tell the process to become a penetration test/ hacker ??

    • @jameslarosa2396
      @jameslarosa2396 Рік тому +38

      I don't know how you guys sleep at night having to worry every minute about someone hacking into the systems you need to keep secure.

    • @duplicake4054
      @duplicake4054 Рік тому

      @@jameslarosa2396 Most of the time, we don't

    • @myname-mz3lo
      @myname-mz3lo Рік тому

      you have to be really good at researching things on the internet instead of asking people for help thats step one lol@@sreyashkanjilal4929

    • @xbabu142x
      @xbabu142x Рік тому +23

      I like to call it PEN15 testing and throw in as many phallic facsimiles as I can get away with in the report while playing dumb.

  • @nicolavolpe531
    @nicolavolpe531 Рік тому +14

    This is one of the best of this series, together with Burial Support. 😂
    This guy kept me glued to the screen wanting to know more about what he had to say

  • @ferryvantichelen6521
    @ferryvantichelen6521 Рік тому +186

    We have the rule if someone does not lock their laptop and walks away, it's fair game to send "I'll bring cake tomorrow!" in the company wide Slack channel. It's not much, but it's a start of some education about security. And cake.

    • @MLBlue30
      @MLBlue30 Рік тому +16

      I was told there would be cake but it was a lie. Taking my stapler was the last straw, so I burned down the building.

    • @pathosmathos6529
      @pathosmathos6529 9 місяців тому +9

      Clever! We used to change people's languages.

    • @5bars3g36
      @5bars3g36 9 місяців тому +2

      Ctrl-shift-Right (on Intel integrated graphics machines) is another good one for messing with people who leave their computer signed in.

    • @orngjce223
      @orngjce223 7 місяців тому +4

      Same way Rickrolling has been one of the best ways to teach people to be cautious about which links you click.

    • @Liliarthan
      @Liliarthan 5 місяців тому

      It’s shocking how many people leave their desktops unlocked. It’s like wearing a seatbelt for me, I don’t feel comfortable until I hit Ctrl L before I leave my desk.
      Also predictable passwords that they don’t change frequently. The number of “Admin” “admin” server admin accounts I’ve seen is also concerning.

  • @ICLight412
    @ICLight412 Рік тому +11

    I enjoyed your video. I’m older going back to school at Devry for IT and Networking. At the moment got online classes dealing with Cisco security. The other wire, wireless and optical. There’s so much to learn and it’s getting more interesting as I get deeper into the tech world. I’m still on the surface while getting a solid understanding.

  • @quietstar09silver50
    @quietstar09silver50 Рік тому +104

    Annual pen testing reminds you it is best to not trust anyone and treat everything as suspicious. This was another good reminder to be careful online.
    Spear-phishing scares me the most. Some attempts are very hard to spot.

    • @keithd.2722
      @keithd.2722 Рік тому +23

      People in the security industry tend to express this a bit differently - "trust _BUT VERIFY"._

    • @GreyAzazel
      @GreyAzazel Рік тому

      I've been spear phished more than a few times. Some of them are very convincing. It does make me wonder about the security of a platform like LinkedIn in conjunction with the standard first.lastname@companydomain. If email wasn't as easy to guess I think that would decrease phishing attacks of all kinds.

    • @alexandermacneil4430
      @alexandermacneil4430 Рік тому

      Phishing has become even more effective now that non-English speaking hackers can leverage LLM such as ChatGPT to write more convincing emails!

    • @julianakarasawa315
      @julianakarasawa315 Рік тому +14

      Absolutely true 😂 annual pen testing was the only time I got commended for being grumpy and telling front desk "I'm not expecting anyone, send them away" when red team tried to use me to get physical access to the building under the guise of a visit

    • @MaskedDeath_
      @MaskedDeath_ 9 місяців тому

      ​@@julianakarasawa315 They're probably going to treat that as a competition for you guys haha

  • @Inscyght
    @Inscyght Рік тому +11

    As a penetration tester, I can confirm this is solid information. Good high-level answers to every question.

    • @biggusdickus8452
      @biggusdickus8452 6 місяців тому

      High level answers explained in low level vocabulary as well.

  • @juliusnovachrono4370
    @juliusnovachrono4370 Рік тому +154

    This video is genuinely hilarious yet fascinating at the same time.

    • @AsiaDanceScene
      @AsiaDanceScene Рік тому +11

      I think you spelled 'terrifying' wrong...

  • @jhandle900
    @jhandle900 6 місяців тому +12

    Please have him back on.

  • @iagmusicandflying
    @iagmusicandflying Рік тому +152

    Thanks for the blue team love! We love you right back, even if we don't always show it.
    Also: clipboard + hi-vis vest is also an amazing pen test tool. Bonus points if you have the metal clipboard with storage. And practice a bored, slightly disgruntled (not full on angry) look. 30 bucks at Amazon and a few basic acting chops go a LONG way to getting you into places you shouldn't be.

    • @error.418
      @error.418 Рік тому +8

      just go ahead and credit Deviant Ollam, please

    • @DreamsInHD
      @DreamsInHD Рік тому +4

      That’s real. Go Blue Team!

    • @RogueCylon
      @RogueCylon Рік тому

      He knows who pays the bill.

    • @iagmusicandflying
      @iagmusicandflying Рік тому +7

      @@error.418 sure, why not, even though I've done this as far back as the 1980s and I'm not the first to do it.

    • @Glitchunlocked
      @Glitchunlocked 11 місяців тому +11

      @@iagmusicandflying Some people are too young to realize not everything originates on the the internet lol.

  • @TheWakeupandsk8
    @TheWakeupandsk8 Рік тому +1

    Jayson Street has an incredible DEFCON speech on penetration testing.. i highly recommend watching it

  • @Sunflowersarepretty
    @Sunflowersarepretty Рік тому +113

    Never would I ever pick a USB no matter how tempting it feels. Also loved it when asked "how to rob a bank" and he said that he knows but wouldn't tell 😂

    • @smnsmnsmn
      @smnsmnsmn Рік тому +30

      Jason has done a talk at Defcon called “Steal Everything, Kill Everyone, Cause Total Financial Ruin!” where he breaks into a building using a piece of cardboard. Cannot recommend it enough.

    • @Squant
      @Squant Рік тому +15

      I'm the opposite. I'd never ignore one and honestly, I'm surprised Jayson said he would. It seems far more plausible he's got a bunch of secure burner laptops he can use to plug them in and find out what other people are trying to hack with.

    • @geshkigal
      @geshkigal Рік тому

      @@smnsmnsmn he's also gone on the Darknet Diaries podcast, Ep. 6

    • @lolwtnick4362
      @lolwtnick4362 8 місяців тому

      cause he doesn't know. it's much easier to rob a armored vehicle than it is to rob a bank.

  • @rio197
    @rio197 Рік тому +5

    Finally! A cybersecurity expert that we deserve!

  • @austinhoff66
    @austinhoff66 Рік тому +107

    I don’t know how you find these people but keep it up. Such great communication with so much to learn

    • @myname-mz3lo
      @myname-mz3lo Рік тому +16

      he is verry famous and does conferences and talks all the time .

    • @ruk2023--
      @ruk2023-- Рік тому +5

      Google "Who is the number one expert in the field that I'm interested in" and then hire them.

    • @error.418
      @error.418 Рік тому +5

      he's given about 1000 talks at DEFCON

    • @aqwandrew6330
      @aqwandrew6330 11 місяців тому

      whats defcon?@@error.418

    • @gabrote42
      @gabrote42 11 місяців тому

      ​@@ruk2023-- more like "who is the most influential?", because they sure don't bring Magnus Carlsen to talk about Chess, but they bring GothamChess

  • @deelanmj
    @deelanmj Рік тому +1

    This has to be one of my favorite Support videos on Wired (the others being Mortician Support and Doc Support). More of this, please! Very educational and enlightening.

  • @PrestonMcNair
    @PrestonMcNair Рік тому +53

    I’ve been a fan for a long time, read his book during my undergraduate studies. Clear, concise, and to the point.

    • @SyjaneTV
      @SyjaneTV Рік тому +2

      How come your YT is verified with only 517 subs ?

  • @johnsonken96
    @johnsonken96 Рік тому +3

    I stumbled across an old spy video that had a unique spy gadget hidden in a belt. Even a tool made in the 1930's seemed so technologically advanced. It made me wonder just how crazy the spy/hacker technology must be today.
    And this video made it clear: it's absolutely crazy.

  • @sebastian04368
    @sebastian04368 Рік тому +25

    Out of the best videos I have seen on Wired. I hope to see a second part with that same guy. He is quite clear in the way he speaks and you can also tell he knows quite a lot 😃

  • @jgassman
    @jgassman Рік тому +1

    As someone that works with InfoSec regularly, this guy is spot on. Thanks for this video, Wired.

  • @schelletick
    @schelletick Рік тому +11

    Your comment that, Every employee is part of the security team, is something that will always be embedded in me now, thank you so much

  • @BoJangles42
    @BoJangles42 Рік тому +1

    I’ve been an infosec pro for 20+ years, this guy was great.

  • @anwarfaridshahudin6305
    @anwarfaridshahudin6305 Рік тому +84

    3:19 He's being real here 😂😂😂
    Report & documentation is the most challenging part of any job.

    • @bikeny
      @bikeny Рік тому +9

      Yeah, I felt that one, too. When I was programming back in the day, 'What do you mean I have to document every single line of code?' And don't get me started on flowcharts. I had hair back then, and there were times I was pulling it out. It's all gone now, so who know what caused the baldness. At least my salt and pepper beard is working.

    • @alihms
      @alihms Рік тому +4

      True. What's the most difficult part of a PhD program? Thesis write-up - not the research part of it. I know a few guys who did not complete their doctorates because of it.

    • @ShawnFumo
      @ShawnFumo Рік тому +1

      @@bikenyThankfully the "document every line of code" is a bit less common now, but there is plenty of other things that are difficult to get through.

    • @realStinger
      @realStinger 7 місяців тому

      I hate writing reports man. Most boring part of hacking.

  • @NikitaShokin2003
    @NikitaShokin2003 2 місяці тому +5

    The biggest security hole sits in front of a monitor

  • @omg_look_behind_you
    @omg_look_behind_you Рік тому +18

    the social engineering god himself. best talks of all time were done by this OG

  • @pudniskool
    @pudniskool Рік тому +1

    Please bring this guy back frormore interviews. super interesting and a great speaker.

  • @CitroChannel
    @CitroChannel Рік тому +9

    Please bring this guy back for multiple sessions! He's a great communicator with a lot of interesting insight and legit experience in cybsersecurity!

  • @CptnCobblestone
    @CptnCobblestone Рік тому +58

    If only more concepts were as quick and easy to understand as this was. I’m in cybersecurity wanting to branch out and this was the information I needed before I got started. Thank you

    • @myname-mz3lo
      @myname-mz3lo Рік тому

      this info is available everywhere online lookup network chuck or david bombal

  • @skunkjulio
    @skunkjulio 3 місяці тому +2

    one of the best Wired "___" Support videos ever

  • @0num4
    @0num4 Рік тому +40

    The weakest part of your network is always the human element. Train your people on what to expect, and train them to raise the red flag when something seems at all suspicious.
    I've been in this industry for 20+ years and even I've had pen testers get through my defenses. It was a valuable lesson: even a professional isn't beyond making mistakes. And it didn't happen again.

    • @l33tninja1
      @l33tninja1 Рік тому +9

      Treating them with common decency also helps since they will actually care what happens. You treat them like crap they won't care about their job and so won't take actions as readily if they see something wrong. It becomes a "not my problem" situation.

    • @0num4
      @0num4 Рік тому +3

      @@l33tninja1 100% !! Respecting your people is a must.

  • @armorhide406
    @armorhide406 9 місяців тому

    My job forces us to go through cybersecurity trainings. Not only are they boring, they're poorly designed. This video is miles better than the training we're given, and actually is engaging. Bravo

  • @matt8239
    @matt8239 Рік тому +41

    as a security tech, it feels almost illegal releasing this video lol.

    • @XSemperIdem5
      @XSemperIdem5 Рік тому +34

      The bad guys already know the tricks anyway. This is serving as education so other people know what to be wary of.

    • @matt8239
      @matt8239 Рік тому

      of course, was more of a joke. But lots about this video easily entices the wrong crowd @@XSemperIdem5

  • @andini7478
    @andini7478 5 місяців тому +2

    I was gagged the whole video, this guy is the simultaneously the coolest person in the world and the most dangerous person in the world. Respect him fr

  • @57thorns
    @57thorns Рік тому +36

    I believe the right thing to do if you catch someone with a "get out of jail free card" is to escort them back to a public area, and wait for the person that will actually release them. However, in a real situation, there is always the threat of violence.

    • @Roccondil
      @Roccondil 11 місяців тому +3

      Either that, or call your boss who should be high enough to be able to directly call whoever is apparently responsible for the unknown person.
      Because as mentioned in the video, the numbers might be false and the answering party might give excuses why they can’t appear in person to validate the intruder, while the person you are detaining is putting pressure on you because you are costing the company precious time and money…

    • @halfsourlizard9319
      @halfsourlizard9319 9 місяців тому

      Call people?! Is it 1965 or something?!

    • @Roccondil
      @Roccondil 9 місяців тому +2

      ​@@halfsourlizard9319 yeah. phones didn't get tossed out in 1966.
      Or what do you think that little rectangular device in your pocket is meant to be used for?

  • @BoneGoddess
    @BoneGoddess Рік тому +2

    This guys still straight up in 2000 and I dig it

  • @enchantro
    @enchantro Рік тому +18

    This is one of the scariest things I’ve seen about the times we live in!😳

    • @myname-mz3lo
      @myname-mz3lo Рік тому +9

      ethical hackers hack so you dont get hacked if anything this is reassuring to know that there are more people like him than bad hackers out there .

  • @gaara2578
    @gaara2578 Рік тому +8

    Currently in college for Cybersecurity and I'm so glad this video came out. Honestly makes me much more excited to study this field more. Also was thinking of going for my masters in this field, is it worth it? I also would get certs along the way

    • @リset
      @リset Рік тому

      absolutely

  • @gran-roan
    @gran-roan Рік тому +29

    This video is so concise, clear and relevant, that it really needs a 2nd part

    • @aetch77
      @aetch77 Рік тому +4

      Google him, his talks are not usually so technical.

    • @gran-roan
      @gran-roan Рік тому

      @@aetch77 Thanks, will do

  • @aboxinspace
    @aboxinspace 5 місяців тому +3

    WE NEED MORE JAYSON VIDEOS PLEASE

  • @openskies11
    @openskies11 Рік тому +4

    When he said "kitty pictures," I thought he meant something completely different. Big sigh of relief when I saw it spelled.

  • @dhouchin83
    @dhouchin83 Рік тому

    I'm a Security Culture Manager, and I'm so glad he said what he did about investing more in people. Spot on!

  • @N0ENEMIES
    @N0ENEMIES Рік тому +9

    Im not even a pen tester or "hacker" but I've always enjoyed Jayson Street's talks.

    • @N0ENEMIES
      @N0ENEMIES Рік тому +3

      Lmao, a USB audit 😂

  • @KentonKoneval
    @KentonKoneval 7 місяців тому +3

    6:40 - sweet now I can use my lack of skills and experience as a way to convince employers that I’m too smart and experienced to just be sharing that information on the internet. The ultimate interview bypass

  • @kasnitch
    @kasnitch Рік тому +15

    I did learn something important ... don't mess with a skilled IT person . Be well .

  • @davidt3563
    @davidt3563 7 місяців тому +1

    My favorite breach ever is using part of a plant in the lobby to use to trip the motion sensors on every door. They expected all these technological gadgets and I got in with a nylon plant piece.

    • @MikeLikesChannel
      @MikeLikesChannel 7 місяців тому

      You coulda just said you’re the new florist and delivering flowers.

  • @seanhulbert8385
    @seanhulbert8385 Рік тому +9

    A lot of good tools here, we use to make all of our own tools. One thing he didn't mention 95% of the telco rooms are outside the building and once you have access to the MPO/DMARC you have ultimate access to their phones and Internet access.

  • @xCheddarB0b42x
    @xCheddarB0b42x Рік тому

    Glad to see someone preaching employee training on how to spot social engineering and email phishing attacks. Preach on, brother. 🙌

  • @KaiHolden.
    @KaiHolden. Рік тому +19

    'Penetration Testing' sounds crazy💀

  • @aarongarcia6083
    @aarongarcia6083 11 місяців тому +1

    It's hard for a lot of IT professionals to be able to explain these type of things to people that have zero knowledge and he does that extremely well.

  • @minutemadeinc
    @minutemadeinc Рік тому +10

    If you're not already, you would make a wonderful instructor.

    • @mandyurbont6707
      @mandyurbont6707 Рік тому

      He does talks at a ton of cybersecurity conferences.

  • @TurkeyFamily
    @TurkeyFamily 4 місяці тому

    So far this is the best training video that I ever since to raise security awareness for workers.

  • @clearmenser
    @clearmenser Рік тому +7

    The expert, Jayson E. Street is a great communicator. Check out his talks, there's tons.

  • @DownEastSaw
    @DownEastSaw 8 місяців тому +1

    I’ve never seen a more perfect example of the “I’m a penetration tester” uniform. This man must be the leader of all penetration testers.

  • @garcipat
    @garcipat Рік тому +17

    Very cool and scary at the same time. Thank you

    • @myname-mz3lo
      @myname-mz3lo Рік тому

      he is making things safer how is it scary lol ??

    • @Squant
      @Squant Рік тому +1

      @@myname-mz3lo Because attacks happen constantly, every single day? I'm not scared personally, but you're talking like crime is a small-time problem. It's big.

    • @garcipat
      @garcipat Рік тому

      @@myname-mz3lo its scary how few things you need to break into such high systems.

  • @aleneverson9022
    @aleneverson9022 11 місяців тому +2

    nah bro this man humbling every single company he's been hired by 😭😭

  • @jestangames
    @jestangames Рік тому +6

    i remember there being a thing with apple's calendar. you could inject code when sending a schedule request, this wouldnt be a problem since you need to accept it first. but apparently if you send a schedule request for a date in the past, it automatically puts it in the target's calendar and it could run the code

  • @RADULCHOS
    @RADULCHOS 9 місяців тому +4

    8:15 Savage

  • @WastelandWarfighter273
    @WastelandWarfighter273 Рік тому +5

    Give this guy a show!

  • @lisajackson3743
    @lisajackson3743 Місяць тому +2

    Question starts at 8:55

  • @PLBiohazard
    @PLBiohazard Рік тому +10

    Working at a company where phishing simulations for all employees are done like a mini-game, with leaderboards and clever traps.
    Got caught once, been paranoid and vigilant ever since. Best way to learn is to make mistakes thanks to simulations. Surprisingly efficient.

  • @ArthurZakaryan23
    @ArthurZakaryan23 Рік тому +1

    Really well explained video and it's amazing when he breaks down all the various tools he uses and how easy it is to be hacked with any number of those tools.

  • @99prxp
    @99prxp Рік тому +4

    8:10 bro paid to find the weakest link only to find out its him.

  • @lacefacelia
    @lacefacelia Місяць тому

    This guy is cooler than I’ll ever be. So many gadgets I had no clue

  • @EyesOfByes
    @EyesOfByes Рік тому +13

    6:14 #MaxFosh managed to get into the major security convention in Las Vegas, with this trick among others. He wasnt detected. He. Snuck. In. To. A. SECURITY. Convention :D

  • @dakotaboy80
    @dakotaboy80 Рік тому +1

    This guy is dangerous. I'm glad he's on our side.

  • @ruk2023--
    @ruk2023-- Рік тому +4

    Making computer hacking interesting is no small task. I love his firewall analogy.

  • @TheGreatJay5ive
    @TheGreatJay5ive 11 місяців тому

    Wow his analogy of an firewall being compare to a bouncer at a club was great! It was never put to me like that, granted I knew what a firewall was but his comparison makes it easier to understand.

  • @jier9904
    @jier9904 Рік тому +9

    love how they still call it twitter, nobody wants to call it X lmaoo

  • @mythical_pizza
    @mythical_pizza Рік тому +1

    It's incredible how far "sounding like you're supposed to be there" can get you places

  • @AllNamesWereAlreadyTaken
    @AllNamesWereAlreadyTaken Рік тому +26

    Awesome guy (you instantly feelhis passion about what he is doing) I love listening to him eventough its kinda scary !

    • @myname-mz3lo
      @myname-mz3lo Рік тому

      how is it scary ? he hacks companies so that bad people dont .. its reassuring more than anything to know that there are more good hackers than bad ones

    • @AllNamesWereAlreadyTaken
      @AllNamesWereAlreadyTaken Рік тому +2

      @@myname-mz3lo it's scary how easy some tricks are and how vulnerable everyone is.

  • @batsreggad
    @batsreggad Рік тому +1

    Mr. Jayson such amazing person to deliver the dangerous things that can be happen

  • @lawrencefrost9063
    @lawrencefrost9063 Рік тому +45

    Penetration Tester... They gotta figure out a new name for that profession.

    • @magicvibrations5180
      @magicvibrations5180 Рік тому

      We gotta ban any word that people choose to sexualize now? Penetration testing is the best description of what they're doing.

    • @3xpl0i79
      @3xpl0i79 Рік тому +4

      I personally like it better than "Hacker"

    • @keithd.2722
      @keithd.2722 Рік тому +4

      "Vulnerability documenter" just doesn't have the same ring to it.

    • @Sabbagery
      @Sabbagery Рік тому +4

      How about “Penetrator”?
      wait

    • @duplicake4054
      @duplicake4054 Рік тому +1

      Well, at least it's true, you test to see if you can penetrate computers. I prefer 'ethical hacker' or 'cybersecurity analyst' more though

  • @ChrisM-tn3hx
    @ChrisM-tn3hx 11 місяців тому +1

    It's funny you mention attire. At one point, I had long hair that went halfway down my back. I tested once to see how differently I was treated if I went somewhere dressed in jeans and a T-Shirt, then later with my hair tied back, neat as a pin in a thousand dollar suit. It's incredible the difference in perception and how you're treated. Not to mention the trust afforded you. Nobody even realized I was the same person.

    • @NBSV1
      @NBSV1 11 місяців тому +3

      Wearing a delivery, maintenance, or janitor uniform can get you a lot of places too. People tend to not pay attention to laborers.
      Especially when you get a lazy security person.

  • @TheGoodContent37
    @TheGoodContent37 Рік тому +6

    That's what she said

  • @gregmgm06
    @gregmgm06 Рік тому +4

    Good job Jayson! Hope to see you on more of these videos! Very informative.