We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Why did you lose the last PS5 restock to a bot?

00:00

Formal Metadata

Title
Why did you lose the last PS5 restock to a bot?
Subtitle
Top performing account crackers business modules, architecture, technique
Title of Series
Number of Parts
Author
Contributors
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
The rise of the machines. Whenever you buy online, especially if it's a limited stock item, you compete against bots and most likely lose miserably. Have you tried to buy a GPU/PS5 or even baby formula and couldn't understand how stock ran out after 3 minutes? Maybe, you tried to online schedule an appointment with government services but couldn't find available spots for the next months? Have you ever seen your favorite artist's concert tickets - sold for 4-5X of his original price? Bots operators are to blame. Every bot user can simulate thousands of concurrent human-like web interactions. They will buy everything you want before you even google it, take appointment spots with government services you will pay for later, win at every online auction you attend, and fake positive reviews that will make you buy scam products. Even when you are asleep, there's a good chance that a bot is trying to log into one of the 200+ digital accounts you own by guessing your ridiculously - predicted password. Malicious automation is here to stay, serving tens of thousands of hackers and retail scalpers while driving billions of dollars worth of marketplaces. During my talk, we will dive deep into the fascinating architecture, business modules, and techniques top-performing account crackers and retail bots developer uses to maximize their success rate and revenue. If you're: In the hacking community: you'll learn techniques top-performers probably won't share so they won't lose their relative advantage over you. Part of the CyberSec community: this talk will trigger many research leads you probably never thought of. Own E-shop - you'll learn how bots sabotage your supply, stock, client experience, and marketing analytics. Sneakerhead/Gamer - get to know how your GPU/PS5/Sneakers sellers really get their stock.
Denial-of-service attackModule (mathematics)Physical systemForcing (mathematics)Multiplication signIdentity managementCASE <Informatik>Open setData conversionConnectivity (graph theory)Hacker (term)1 (number)Arithmetic meanProfil (magazine)Task (computing)Slide ruleDigital photographyTotal S.A.Computing platformDistribution (mathematics)Parameter (computer programming)Web 2.0RobotComputer architectureClient (computing)Characteristic polynomialCybersexInformation securityInternetworkingCartesian coordinate systemPoint (geometry)Decision tree learningMalwareOperator (mathematics)Service (economics)Scheduling (computing)Software crackingInteractive televisionMereologyStatement (computer science)View (database)Hydraulic jumpGame theoryInformationBitLatent heatConcurrency (computer science)Deep WebGraphics processing unitPasswordProduct (business)Video game consoleReal numberProxy serverPerspective (visual)AutomationDisk read-and-write headBookmark (World Wide Web)10 (number)SoftwareForm (programming)PerimeterLoginMaxima and minimaDifferent (Kate Ryan album)Scaling (geometry)Avatar (2009 film)Computer simulationComputer animation
ArchitectureHacker (term)Configuration spaceComputer wormNetwork topologyAreaPlanningGame theoryoutputGamma functionEmailTwin primePasswordMotion captureDifferent (Kate Ryan album)PlastikkarteComputer wormDependent and independent variablesCodecWebsiteMereologyLoginTable (information)Computer programmingChecklistScripting languageService (economics)EmailConfiguration spaceGreatest elementLatent heatInternet forumHacker (term)PasswordSoftware testingWeb 2.0Process (computing)VirtualizationType theoryEnumerated typeHTTP cookieServer (computing)Slide ruleValidity (statistics)Open setConnectivity (graph theory)DatabaseTouch typingLogicOpen sourceSet (mathematics)Shape (magazine)Combinational logicPreconditionerINTEGRALCybersexBitOrder (biology)StatisticsVariable (mathematics)PredictabilityKey (cryptography)Compilation albumAddress spaceElectronic mailing listSoftware developerNumberPattern languageComputer architectureInformation securityProxy serverLink (knot theory)Stack (abstract data type)Form (programming)Flow separationForcing (mathematics)Right angleSign (mathematics)Task (computing)Differential (mechanical device)FreewareRow (database)Exploit (computer security)Computer animation
PasswordEnumerated typeDataflowProxy serverComputer networkCAPTCHAComputer iconImage resolutionBlock (periodic table)FreewareOperator (mathematics)Phase transitionMultiplication signInformation securityWebsiteBusiness modelOpen sourcePoint (geometry)Software crackingLastteilungInternet forumMoment (mathematics)Proxy serverSoftwareLatent heatFactory (trading post)Real numberHacker (term)CybersexRegulator geneThresholding (image processing)Social engineering (security)MeasurementPasswordBridging (networking)DivisorEmailRandomization1 (number)Perspective (visual)Bit rateRepository (publishing)Order (biology)Enumerated typeSet (mathematics)Group actionType theoryProduct (business)WeightStandard deviationDifferent (Kate Ryan album)HypermediaAuditory maskingServer (computing)RobotLoginElectric generatorGreatest elementOpen setCycle (graph theory)Motion captureOperator (mathematics)Service (economics)Table (information)FacebookElectronic mailing listPredictabilityPay televisionWell-formed formulaMereologyCombinational logicState of matterForm (programming)DigitizingValidity (statistics)Core dumpInheritance (object-oriented programming)IP addressVideo game consoleCodeComputer animation
Operator (mathematics)Keilförmige AnordnungServer (computing)Multiplication signExecution unitHoaxDifferent (Kate Ryan album)Server (computing)Polar coordinate systemProduct (business)Proxy serverRobotCommunications protocolRemote procedure callEmulatorAddress spaceMobile WebKnowledge baseWeb crawlerWebsiteService (economics)Endliche ModelltheorieVideo game consoleConnectivity (graph theory)SummierbarkeitConfiguration spaceKeyboard shortcutFunctional (mathematics)Game controllerGroup actionLatent heatConnected spaceGame theoryIP addressShared memoryOpen setPolygon meshTask (computing)ExistenceOrder (biology)Software crackingDivisorFingerprintTwitterSlide ruleEmailMereologyThresholding (image processing)Data managementSinc functionFocus (optics)Goodness of fitHacker (term)Flow separationTouchscreenPlastikkarteOperator (mathematics)Ferry CorstenPeer-to-peerOnlinecommunity
EmulatorInterior (topology)EmailCodeSoftware testingDifferent (Kate Ryan album)Multiplication signFigurate numberInformation securityLevel (video gaming)Order (biology)Software testingBridging (networking)CodeProduct (business)FrequencyAuthenticationVideo gameService (economics)In-System-ProgrammierungEmailClient (computing)RobotConfiguration spaceWebsiteWater vaporOperator (mathematics)Message passingSoftware developerMaxima and minimaHacker (term)Proxy serverSinc functionKey (cryptography)Internet forumChainPhase transitionSpacetimeCASE <Informatik>Formal languageDenial-of-service attackHypermediaWordData conversionRight angleExistenceOpen setDivisorType theoryDistribution (mathematics)Computer wormPasswordReverse engineeringComputer architectureSoftware crackingElectric generatorConsistencyEnumerated typeDifferential (mechanical device)ParadoxCodecSet (mathematics)Form (programming)Game controllerLogic
Transcript: Englisch(auto-generated)