We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

DEF CON Comedy Inception

00:00

Formal Metadata

Title
DEF CON Comedy Inception
Title of Series
Number of Parts
109
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
This year at DEF CON a former FAIL PANEL panelist attempts to keep the spirit alive by playing moderator. Less poetry, more roasting. A new cast of characters, more lulz, and no rules. Nothing is sacred, not the industry, not the audience, not even each other. Our cast of characters will bring you all sorts of technical fail, ROFLCOPTER to back it up. No waffles, but we have other tricks up our sleeve to punish, er, um, show love to our audience, all while raising money of the EFF and HFC. The FAIL PANEL may be dead, but the “giving” goes on. Speaker Bios: Larry Pesce is a Senior Security Analyst with InGuardians. His recent experience includes providing penetration assessment, architecture review, hardware security assessment, wireless/radio analysis, and policy and procedure development for a wide range of industries including those in the financial, retail, and healthcare verticals. Larry is an accomplished speaker, having presented numerous times at industry conferences as well as the co-host of the long running multi-award winning Security Podcast, Paul's Security Weekly. and is a certified instructor with the SANS Institute. Larry is a graduate of Roger Williams University. In his spare time he likes to tinker with all things electronic and wireless. Larry is an amateur radio operator holding his Extra class license and is regularly involved in emergency communications activities. In 1972 a crack commando unit was sent to prison by a military court for a crime they didn't commit. These men promptly escaped from a maximum security stockade.... making the decision to leave Amanda behind. Ms. Berlin is now rumored to have illegitimate children by Saudi Oil barons hidden all over the world in at least 27 countries but this can neither be confirmed nor denied. Amanda Berlin is a Network Security Engineer at Hurricane Labs. She is most well known for being a breaker of hearts, knees, and SJW's. Bringing "Jack of All Trades" back to being sexy, she has worked her fingers to the bone securing ISPs, Healthcare facilities, Artificial Insemination factories, and brothels. Amanda managed the internal phishing campaign at a medium size healthcare facility to promote user education about phishing and hacking through an awards based reporting program. She is a lead organizer for CircleCityCon, volunteers at many other conferences, and enjoys writing and teaching others. Twitter: @InfoSystir Chris Blow is a Senior Technical Advisor with Rook Security. His most recent experience includes: penetration testing, social engineering, red team exercises, policy and procedure guidance focused on HIPAA and PCI DSS, developing security awareness programs, performing HIPAA assessments and serving as a Qualified Security Assessor for the Payment Card Industry. @b10w In reality, his primary duties are to be told by various clients that “security is hard” and to just “accept the risk.” He’s also well-versed in being told to keep vulnerable assets and people “out of scope.” Chris is a graduate of Purdue University in West Lafayette, IN. Besides trying to keep up with all-things-InfoSec, Chris enjoys playing guitar, singing, and DJing. Twitter: @b10w illwill is a rogue blackhat as fuck subcontractor for top secret global governments. He spends his off time enjoying bubble baths, recovering from a debilitating injury as infosystir's former bean fluffer and hand carves realistic thrones made from discarded dildos found dumpster diving behind a porn store in Los Angeles. Dan Tentler likes to break things. He's also an expert on failure. Ask him about it. But ask with scotch. Twitter: @viss @chrissistrunk
32
Thumbnail
45:07
Internet forumLevel (video gaming)CybersexDifferent (Kate Ryan album)Multiplication signPerturbation theoryHacker (term)Data storage deviceMereologyDecision theoryRight angleIterationVariety (linguistics)AreaGoodness of fitInternet forumPOKEBitOrder (biology)QuicksortComputer animation
QuicksortDifferent (Kate Ryan album)Position operatorInformationMusical ensembleMultiplicationFamilyRoundness (object)Hacker (term)Level (video gaming)Integrated development environmentArtificial neural network
Group actionArtificial neural networkPerturbation theory1 (number)SoftwareMultiplication signOnline helpSelf-organizationRight angleVideo gameGodMereologyRevision controlPerturbation theoryFigurate numberAdventure gameStatement (computer science)Green's functionSpherical capAreaLaptopTime zoneExecution unitBridging (networking)BitValue-added networkTouch typing2 (number)DeterminismGoodness of fitComputer animation
Internetworking2 (number)DeterminismInternetworkingRight angleConnectivity (graph theory)Multiplication signBuildingSeries (mathematics)Wave packetAuditory maskingDifferent (Kate Ryan album)Variety (linguistics)Scripting languageStapeldateiComputer animation
TwitterWorkstation <Musikinstrument>Server (computing)Web 2.0Shooting methodCopyright infringementTwitterWorkstation <Musikinstrument>WindowGodInternetworkingPasswordComputer animation
Power (physics)Key (cryptography)Right anglePower (physics)Source codeSoftware developerReal numberLevel (video gaming)Formal languageCybersexReading (process)Computer animation
Software testingStructural loadLevel (video gaming)AreaRight angleCodeBuildingPhysical systemExistenceGoogle MapsStructural loadSoftware testingProcess (computing)Server (computing)Goodness of fitDenial-of-service attackMultiplication signInternetworkingComputer animationSource code
ASCIITable (information)Physical systemMultiplication signTrailMoving averageInternetworkingGodRight angleTwitterCybersexCodeSubsetGame theoryRouter (computing)Metropolitan area networkComputer animation
CybersexPlastikkarteInternetworkingWorkstation <Musikinstrument>Reading (process)Connectivity (graph theory)Multiplication signComputer animation
Control flowMachine visionLevel (video gaming)MereologyTwitterGame controllerInternetworkingRandomizationCopyright infringementDigital photographyRight angleLine (geometry)Arithmetic meanPoint (geometry)ThumbnailComputer animation
Sign (mathematics)Directory serviceBuildingInformationInternetworkingWorkstation <Musikinstrument>Food energyGame controllerFörderverein International Co-Operative StudiesProjective plane1 (number)Lattice (order)Wave packetSuite (music)Case moddingCommunications protocolControl systemService (economics)Sign (mathematics)TwitterComputer animation
Office suiteSign (mathematics)Power (physics)Real numberScripting languageBitCase moddingDisk read-and-write headInternetworkingOffice suiteDirectory serviceRight angleQuicksortFamilyReverse engineeringCodeGoodness of fitRemote procedure callInformationMotion capturePower (physics)Multiplication signPhysical systemComputer animation
Sign (mathematics)GodComputational intelligencePoint (geometry)BuildingOffice suiteGoodness of fitMultiplication signInformation securitySlide ruleType theoryWorkstation <Musikinstrument>Text editorInternetworkingData miningMassManifoldKey (cryptography)Firewall (computing)TwitterTheory of relativityRight anglePower (physics)Connectivity (graph theory)Public key certificateCoefficient of determinationAreaSource codeComputer animation
Server (computing)Online chatLink (knot theory)Functional (mathematics)Multiplication signRight angleInternetworkingAsynchronous Transfer ModeComputational intelligenceDisk read-and-write headBitArtificial neural networkCall centreReading (process)AverageSoftware testingFirewall (computing)Touch typingMetropolitan area networkComputer virusRevision controlTraffic reportingComputer animation
Demo (music)System callArtificial neural networkData managementInternetworkingMassMoistureFirewall (computing)Demo (music)Level (video gaming)Right angleWindowAuthenticationLoginSlide ruleTangentMereologyTouchscreenCuboidSoftware testingFrame problemGoodness of fitWeb pageComputer animation
Demo (music)Server (computing)WebsiteCuboidSocial engineering (security)Medical imagingMultiplication signBit rateTouch typingDefault (computer science)2 (number)Wave packetInformation securityGame controllerEmailTouchscreenInternetworkingComputer iconDependent and independent variablesException handlingThread (computing)Right angleSoftware testingComputer animation
WeightLength of staySlide ruleMultiplication signBitMachine visionKeyboard shortcutWordReal numberRight angleWeightWindowNumberTime travelPoint (geometry)Physical systemEvent horizonOcean currentOpen setType theoryInstallation artEmailSign (mathematics)Order (biology)Link (knot theory)Power (physics)SoftwareBit rateMereologyEntire functionPasswordProcess capability indexBookmark (World Wide Web)Speech synthesisGoodness of fitTouchscreenHand fanPublic key certificateComputer animation
Office suiteProcess capability indexField (computer science)Dependent and independent variablesGame controllerTraffic reportingNumberCountingMultiplication signGame theoryFile viewerPlastikkarteCartesian coordinate systemComputer animation
Density of statesPlastikkarte1 (number)Right angleRadical (chemistry)LoginCartesian coordinate systemNumberAreaSoftware developerAttribute grammarData storage devicePresentation of a groupMultiplication signPoint (geometry)InternetworkingWindowGodLaptopTrailGame controllerWave packetProcess (computing)Open setOrder (biology)Process capability indexIP addressHacker (term)Density of statesRevision controlMobile appLogistic distributionLogarithmChecklistPlotterMathematicsPhysical systemComputer animationJSON
ScreensaverPower (physics)Letterpress printingMultiplication signBitNumberData storage deviceData managementPoint (geometry)Electronic mailing listChainExpressionException handlingPower (physics)Physical systemMoving averagePlanningVideo gameRadical (chemistry)Right anglePasswordSingle-precision floating-point formatOpen setQuicksortScripting languageComputer animation
FreewareGame theoryWebsitePlastikkarteMultiplication signSlide ruleGraph coloringArmMereologyServer (computing)Regular graphMetropolitan area networkGoodness of fitInternetworkingMetreDevice driverImage registrationBitComputational intelligenceConnected spaceCuboidOrder (biology)Right angleMappingComputer animationSource code
Perturbation theorySingle-precision floating-point formatAutomorphismBootingComputer configurationOperating systemSystem callHand fanOffice suitePerturbation theoryProcess (computing)Goodness of fitMehrplatzsystemInformationAsynchronous Transfer ModeInformation securityLevel (video gaming)TwitterRevision controlNear-ringCoefficient of determinationSoftware testingComputational intelligenceComputer clusterMusical ensembleHTTP cookieMultiplication signMereologyJSONComputer animation
Workstation <Musikinstrument>Cellular automatonData centerProcess (computing)InformationMetropolitan area networkWorkstation <Musikinstrument>Goodness of fitBitType theoryRight angleMusical ensembleNoise (electronics)Open setGraphics tabletFile viewerAsynchronous Transfer ModeDrop (liquid)Line (geometry)Entire functionMultiplication signData centerOffice suiteComputer animation
Event horizonCopenhagen interpretationInformation technology consultingRight angleWebcamCellular automatonGoogolTwitterDependent and independent variablesRing (mathematics)Grand Unified TheoryProcess (computing)Sound effectShooting methodPasswordMathematicsComputational intelligenceIP addressGastropod shellOpen setMetropolitan area networkAddress spacePresentation of a groupMultiplication signPoint (geometry)EmailInternet forumSemiconductor memoryEncryptionInternetworkingJava appletLink (knot theory)GodComputer animation
Computer-generated imageryTotal S.A.Maxima and minimaGodWorkstation <Musikinstrument>Core dumpEmailAddress spaceMoving averageMP3Right angleState of matterOffenes KommunikationssystemObject-oriented programmingProcess (computing)Computer animation
InternetworkingControl flowTouch typingInternetworkingSpacetimeCovering spaceGame controllerACIDLaptopAsynchronous Transfer ModeCountingOffice suitePasswordRight angleComputational intelligenceWebsiteObject (grammar)Slide ruleUser profileKeyboard shortcutGodComputer animation
Information securityPlane (geometry)DialectService (economics)Disk read-and-write headNumberPerturbation theorySlide ruleGoogolFood energyMedical imagingReverse engineeringTraffic reportingMetropolitan area networkPlastikkarteLaptopPhysicalismPasswordPlanningCybersexInternet service providerLoginComputer animation
PasswordServer (computing)Software frameworkDomain nameGame controllerLink (knot theory)Square numberFactory (trading post)Auditory maskingHacker (term)Mathematical singularityShared memoryRemote procedure callCuboidSpreadsheetMehrplatzsystemTouch typingNumberPlastikkarteInformation securityArtificial neural networkInformationPhysicalismComputer animationMeeting/Interview
Information securityExplosionType theoryInformation securityReal numberMultiplication signMetreInternetworkingMetropolitan area networkRight angleTraffic reportingInternet service providerBitHand fanHidden Markov modelRow (database)InformationScripting languageData miningIn-System-Programmierung2 (number)Port scannerLevel (video gaming)State of matterComputer animation
ExplosionPhysical systemWindowMultiplication signNumberTraffic reportingSerial portData miningVirtual machineFile Transfer ProtocolOperator (mathematics)SmartphoneGame controllerMedical imagingSet (mathematics)Water vaporBitBookmark (World Wide Web)PlastikkartePoint (geometry)Covering spaceSlide ruleProcess (computing)Control systemPerturbation theoryTriangle
Physical systemFile Transfer ProtocolLaptopData Encryption StandardPlanningNumberLoginPrisoner's dilemmaConfiguration spaceGoogolBootingSystem administratorArtificial neural networkInternetworkingMilitary baseDomain nameIntegrated development environmentProcess (computing)Complete metric spaceFile Transfer ProtocolHard disk driveMultiplication signProjective planeOnline helpLaptopControl systemSoftwarePhysical systemBackupEntire functionForcing (mathematics)Game controllerRight angleDifferent (Kate Ryan album)
Workstation <Musikinstrument>TwitterMultiplication signServer (computing)Computer virusInternetworkingWindowWater vaporRule of inferenceLine (geometry)Data centerPhysical systemComputer architectureArtificial neural networkEntire functionNumberIntegrated development environmentPower (physics)Causality1 (number)CybersexMetropolitan area networkActive contour modelAreaInformation
Physical systemGodTwitterGroup actionTraffic reportingVulnerability (computing)Data miningBackupProduct (business)Frame problemProof theoryWebsiteValidity (statistics)WindowSoftware bugSequelInternetworkingIP addressProjective planeArtificial neural networkBackdoor (computing)Open sourceGame controllerDomain nameEmailPasswordMereologyPhysical systemControl systemSystem callMeeting/Interview
Control flowPhysical systemDistribution (mathematics)InternetworkingHacker (term)Slide ruleWebcamRight angleGame controllerCybersexMetropolitan area networkReal numberInternetworkingControl systemDistribution (mathematics)Web pagePhysical systemGodNumberMultiplication signHacker (term)1 (number)Operator (mathematics)Scripting languageGraph coloringCoefficient of determinationSystem administratorVariety (linguistics)Directory serviceRootConfiguration spaceBus (computing)Communications protocolCase moddingSuite (music)Computer animation
TwitterConfiguration spaceSoftwareDiscounts and allowancesCase moddingMultiplication signCommunications protocolScripting languageFamilyPower (physics)Data centerEntire functionWater vaporStudent's t-testPersonal digital assistantTournament (medieval)Auditory maskingLevel (video gaming)Physical systemSlide ruleGodBitPlastikkarteEmailPolar coordinate systemFiber (mathematics)Core dumpComputational intelligenceGoodness of fitData miningRing (mathematics)Computer animation
Finitary relationTwitterFirewall (computing)Normed vector spaceTheory of relativityInformation securityCoefficient of determinationFirewall (computing)Multiplication signLink (knot theory)Slide ruleComputer animation
Process capability indexExplosionIRIS-TSystem callFirewall (computing)Software testingFirewall (computing)Traffic reportingCall centreProcess capability indexRevision controlLevel (video gaming)System callSocial engineering (security)Domain nameSystem administrator
Social engineering (security)Computer programEmailClient (computing)Social engineering (security)Multiplication signSoftware development kitMedical imagingCuboidWebsitePlastikkarteEmailDependent and independent variablesInformationKeyboard shortcutReal numberRight angleWave packetSoftware testingFreewareComputer animation
Virtuelles privates NetzwerkBit rateEmailEvent horizonPasswordInformation securityProcess capability indexProcess capability indexPasswordWordEvent horizonRight angleMereologyOcean currentSlide ruleBitSoftwareEmailEntire functionOpen setPublic key certificateWindowTouchscreen
Dependent and independent variablesControl flowBlogTrailMathematicsNumberDependent and independent variablesTraffic reportingGame controllerTrailRight angleData storage deviceCartesian coordinate systemLoginPlastikkartePort scannerMathematicsProcess (computing)Radical (chemistry)
PlastikkarteData Encryption StandardPlastikkarteMathematicsGoodness of fitNumberChecklistCartesian coordinate systemOrder (biology)Logistic distributionProcess capability indexMultiplication signData storage deviceMoving averageVirtual machineChainElectronic mailing listData managementComputer animation
Cellular automatonMobile WebTerm (mathematics)PasswordArtificial neural networkGame theoryPower (physics)PasswordExpressionData storage deviceRadical (chemistry)Single-precision floating-point formatVideo gameFreewareConnected spaceWebsiteDevice driverWord2 (number)Information securityOffice suiteMereologySystem callComputational intelligenceOrder (biology)Level (video gaming)
Musical ensembleMereologyComputer animationSource code
Type theoryFluidLine (geometry)GenderLevel (video gaming)Office suite
MaizeInternet forumInternetworkingEncryptionUltraviolet photoelectron spectroscopyAddress spaceComputational intelligenceMultiplication signGoodness of fitPasswordEmailPoint (geometry)IP addressInformation technology consulting
Information securityTime seriesState of matterAddress spaceEmailState of matterPoint cloudNormal (geometry)Process (computing)Object-oriented programmingComputer animation
Asynchronous Transfer ModeComputational intelligenceClient (computing)PasswordHacker (term)Link (knot theory)Domain nameGame controllerNumberRemote procedure callInternet service providerAuditory maskingLaptopCache (computing)CuboidInformationPlastikkarteSpreadsheetArtificial neural networkServer (computing)Physical lawDialectLoginWebsiteMedical imagingService (economics)Single-precision floating-point formatMehrplatzsystemUser profileSoftware frameworkComputer animation
Multiplication signType theoryInternetworkingBit2 (number)In-System-ProgrammierungInternet service providerComputer animation
Perfect groupRow (database)Hand fanPerturbation theoryInformationMultiplication signSlide ruleCovering spaceComputer animation
TriangleBootingSystem administratorProcess (computing)Domain nameOnline helpIntegrated development environmentSoftwareMultiplication signArtificial neural networkComputer animation
Windows ServerService (economics)WindowLine (geometry)Water vaporServer (computing)Integrated development environmentGodComputer animation
WebsiteWindowGame controllerWeb pageInternetworkingOnline helpCybersexProduct (business)Domain nameIP addressArtificial neural networkSystem callPasswordComputer animation
GodOperator (mathematics)Gastropod shellEnterprise architectureDirectory serviceVariety (linguistics)Multiplication signGraph coloringSystem administratorDiscounts and allowancesScripting languageSystem callComputer animation
WindowCore dumpNetwork topologyFiber (mathematics)Water vaporRadical (chemistry)Power (physics)Physical systemLevel (video gaming)EmailMultiplication signComputer animation
Firewall (computing)Logic gateWide area networkDuality (mathematics)Link (knot theory)Social classEnterprise architectureIdeal (ethics)Annulus (mathematics)MassWave packetEntire functionPhysical systemFirewall (computing)BitComputer animation
Transcript: English(auto-generated)
All right. Let's do this. All right. So I am a former panelist for what was known as the DEF CON comedy jam, otherwise known as the fail panel. This is not the fail panel. It's really close, though. So the fail panel went away. We decided it was time for it to go away. I wanted to carry the torch. So now the panelist has become the moderator. Hence
inception. We're working towards inception. We've gone one level deep. So the panelist is now the moderator. And we've got a bunch of folks that I thought when I was going to submit the CFP that would make some really great part of the resurrected formerly what was
known as the fail panel, now the DEF CON comedy inception. We'll see what we start calling this potentially as we go through. But we're going to have lots of fun. Not everyone while we're here. So to my right in no particular order, we have Dan Tentler.
Amanda Berlin. Chris Distrunk. Chris Distrunk. Not yet. Chris Blow. Will Genovese.
And yours truly, Larry Pesci. Now there are a couple of our panelists that this is their first time on stage at DEF CON. So it's time to drink. Okay. Cyber. I brought the
good stuff. Okay. Amanda, into the mic, right? All right. Okay. Get it close to your
microphone. Chris, technically you spoke earlier at this con, but this is the first time here. So drink up. Dan, would you be so kind as to pass those down? I wouldn't ask you guys to do anything that I wouldn't do. We'll get back to that. Okay. Cheers. To
fail. Moving along. So while we're here, we're going to be soliciting donations for charity. Okay. Who's charity? We'll get there. Which charity? Who's charity? No,
charity is out on the strip somewhere soliciting already. Okay. All right. So in previous iterations of this panel, we've made waffles on stage and all sorts of other
shenanigans. We want to come up with something different because we're in fact different. So we are in fact doing hot sauce tasting for charity. I've got two varieties of hot sauce. We'll get to that in a minute. So consider that. We're going to do hot sauce tasting for charity. Please. If you're going to try some hot sauce, donate something for charity. But some of this stuff is really hot. Consider the value of the
antidote. If you can't handle it, we've got four gallons of milk and four loaves of bread. So we've got you covered. Now that said, I won't ask you guys to do anything I wouldn't do. All right. So when we initially talked about doing this panel, we
talked about doing donations for the electronic frontier foundation and hackers for charity. As moderator, we've changed our mind and I made the executive decision a little
bit earlier. So we've changed the charity that we're going to donate to. How many of you guys know this guy? This is DJ Rance. He's been in our community for many years. He does lots of fun things for us on stage. Spinning all sorts of music. And he
absolutely loves this community. And in fact, the community loves him. Rance, are you here? No? Well, that's okay. I talked to DJ Rance last night. And we're, Rance is in an interesting position. I would consider Rance a good friend even though I don't know him
that well. Just because he's a member of our family as hackers. And Rance was recently diagnosed with pancreatic cancer. He's undergoing multiple rounds of chemo. I talked to Rance. He says this is okay to say. Because the environment is all about learning
and sharing information. He puts it that this is just sharing a different kind of information. So Rance has been diagnosed with pancreatic cancer. And as some of you may know, this is often a death sentence. There are people that do survive. And we really hope that Rance is one of those people. So in honor of all that Rance does for
our community and to show our love for DJ Rance, we are going to in fact collect donations for PanCan.org, the pancreatic cancer research network. I've done some
research with folks and all of our other organizations to help fund pancreatic cancer research and or some either cure or some ability to prolong and or better the life for those who have been diagnosed. So I hate to bring this on a downer right to begin
with. But we really do love Rance, me personally. And no, not like that. Except for that one time at Derby Con when he gave me my first ever White Russian made in a hotel room. So Rance, this one is for you, buddy. All right. So here's the blanket
statement. Tasting this hot sauce is at your own risk. I'm not going to make you sign a waiver. Don't be dumb, please. This stuff is hot. We have one that is a ridiculous
amount of skull units. We have toothpicks. Why? Because some of these you may want just a little. Okay. And then again, I said I wouldn't ask you guys to do anything that I wouldn't do myself. So bear with me for one second. Don't die, bro. All
right. So we have two versions of hot sauce. This is homemade green zombie hot sauce from our garden last season made from green tomatoes as well as a bunch of other
secret stuff. This is the hot one. Figures I should have opened the toothpicks first, right? Don't spill it, bro. Don't fuck it up. Hey, I fucked that up. No, that's the
other one. All right. Audience participation. Stick your dick in it. That's the not hot one. You can ding that whenever you want. That's the not hot one. We'll ding you all day. I'm going to lose my shit. I can't remember the character's name. That doesn't
help. Breaking Bad. The dude with the bell from Hector. Ding, ding, ding, ding. So this is the really hot one. You will note this is the cap. This is not the bottle.
Yeah, there's a little bit on there, Dan. There's some on there, right? Yeah, that's good stuff. Yeah. And for those of you that don't know, Dan makes his own pepper stuff that's amazing. Yeah, that's good. Oh, my God, no. By the way, if you get that stuff
on your hands, don't touch your private areas. Or do. Or anyone else's. Unless you hate them. We don't judge. We don't judge. We just film. All right. But if you do, let us
know. Yeah. All right. So it's time for the kick. So we can go get started with all this fun stuff and hopefully get you guys to laugh. Don't forget to drink. And while these guys are starting to talk, I'm going to get the hot sauce and all the other fun stuff
ready for you guys. So I'll be down on the far end of the stage and have a place for you guys to give us some donations and try some hot sauce and have a good time. So with that, let's get in the van. Let's go get ready to jump off the bridge. And who wants to go first? I think we elected Dan to go first. We think we elected Dan to go first.
Are you kidding me? You're pissed. I don't care. It's that kind of party. No, it's going to be that kind of party. I'd stuck my dick in the mashed potatoes. So Dan, I don't care. You're coming up here, buddy. He is vastly underprepared. Oh, yeah. Did we
neglect to tell you that? What could possibly go wrong? Somebody else could go first. Don't fuck it up. Oh, I plan on it. So Dan, did you not know we were doing a panel and stuff like you need a laptop for? This is the part where we troll you. Oh,
shit. Amanda, what is this pink thing you have in front of you? Higher, higher. What, this? Yeah, that. This is my sexist ban hammer of doom. Do I want to know? There's a vulva on one side and a dick on the other. You can be knighted a sexist. You can be
knighted. Will is going to be knighted in 30 seconds. I actually found this at Gurcon in the hotel room when we checked in. It's made it through four cons. Was it
decorated as such? It was not. I'm pretty sure I just ruined some little girl's something. A pretty, pretty princess. Now it's my pretty, pretty princess hammer. With a dong and a vulva. Which are both pierced. Yes. There's a lot more detail on that
vulva than there is on the dune. There is. The vein work is nice, though. The vein work is nice. Very, very crooked. Does it work? Does it do it? Yeah. Right. So you've got me first. This is going to be the best transcript ever. I hope all you
people brought helmets because you're going to need them. I'm going to do my best to channel George Carlin. 150, holy fuck. Anybody go to Bruce Potter's talk this morning? No? Yeah, I'm going to do that. Yeah, it's going to be that. So yeah, so Larry comes to me a while ago and he says we want you on this panel. I'm like all
right, cool, what's a panel? He says it's a fail panel. I said oh, I have the perfect thing. So for folks that aren't aware of the research I've done, which I suspect almost everyone in the room, I have made a habitual problem of going and finding stupid bullshit on the internet that shouldn't be on the internet and ranting about it at
conferences for something like the last three or four years. It will happen. It's Def Con. Whatever. Is this why I came in with a mask and stuff? Right. So over the last four years or so I've done a series of talks at a variety of different conferences where I poke fun at the different things I found connected to the internet. And
believe me, there are things online that you will do the whole Jackie Chan what the fuck meme face over and over and over again. So the title of my component of this panel is literally 115 Batch of Stupid Things You Can Put on the Internet in As Fast As I Can Go, Somebody Get Me a Drink. With your host, me. About me, nobody cares. Thank you,
sir. Cheers. So big question. If there can be a thing and you can put a web server on the thing, should you put a web server on the thing? Yes. Let me introduce you to tonight's fucking mascot, Totes Magotes. Should you put a web server on the thing?
Totes Magotes. Fuck yeah. Let's do it. Fuck it. We'll do it live. So some of you may remember my 2014 Twitter rampage pirate ninja baby command amount of 9001 when I did that Def Con 20. My fire hose, Jodan talk where I basically did stuff like this.
We'll just get right into it. So why the fuck is a TV station online and I can get to it? Why would you give me control of a fucking television station? Why would you do that? Who is high and why aren't they sharing? Something German. I don't know. It's VNC. What the fuck? Windows CE. Why? What are you doing? Does that say washing? That's my
stuff. Take it off the fucking Internet. Oh, my God. Anybody want to make some phone calls? I bet we can guess the password. Or fuck it. Let's fuck with Korea. They're generating power. Let's go fuck with those guys. That's not my stuff. Press some
buttons and watch the news. It's a really fucking boring Mac desktop on VNC. Who gives a fuck? What a shitty finding. Mac desktop. Wait a minute. I wasn't the first one here. I wasn't the first one here either but it looks like you can get some SSH
keys off of this guy. That's cool. That's fun. Anybody been to the dentist lately? We can go back. We can learn things about drilling people in the skull. You can write some
Python if you feel like it. I write Python. Really angry Python that makes real developers upset. This just hurt my face. I don't know what to say about it. I can't
read. My brain is melting. I'm going to go. Second column, third one down. Love stage. Bang, bang. Well caught. Should we usurp the mascot? I'm not sure. I'm not sure.
That's what Ushi said. You can go to college here if you want. 702 is this area code, isn't it? Shit, I didn't notice that before. 702 is Las Vegas. That may also be the love stage, bang, bang. Anybody know what happens if skate equipment takes a
selfie? Might look like that maybe. A picture of the building in which the skater system exists. Awesome. Now I can find it on Google maps. Another post on the same college. This one was lonely. HTTP load testers. That's cool. Give the public access to
test things. HTTP server. This is preconfigured to denial of service. Well done. Good job. Don't they do that themselves already? Maybe. So you can find solar bullshit on the internet. Why? This could be cool. I'm not sure. I haven't spent a lot of time
playing with it. But grain silos seem fun. Probably way too much. Many, many mornings until 5 a.m. But this guy probably spent a lot more time playing with it. Like setting up mat lab to track sports ball. Okay. That's cool. However, if you
travel to Sydney any time in the future, there's a dessert place I can recommend. There's another place you can buy some squid. That's cool. Squid. On the internet. Why is there fucking squid on the internet? Oh, shit. That's right. The fucking
love. Oh, God. What was that? Amazing. You guys are amazing. This is good. Crowd sourcing the fuckery. If you want to buy some avocados, I know a place. Or if you want to really piss off some dude. Right? So this goes on for a long time.
There are certain times I wouldn't want the lights to automatically come on. Some of these buttons are ridiculous. He's got a guest room and a TV room and a game room and a hearth. I want those problems. I guess what is that? A chest of drawers? Why would you automate it? Even better, a fireplace on the internet. That's fucking smart. Oh, my God. Okay. So
full disclosure. Who knows Dave Maynor? Dave Maynor? One guy. So me and that guy and Dave Maynor had what we called a showdown race on the internet either earlier this year
or late last year. I forget. It was a while ago. And you're going to love this. CSI cyber, their Twitter account posited a question to the Twitterverse asking can you set a fire using the internet to which several of us, no shit jumped out of our chairs and said I'll take that fucking challenge. Really? Challenge accepted. Then we began a Twitter
race where we found for the next three hours just the most batshit random crap you could find. We were using showdown at the time. Which by the way, if John is here, everybody should point to John and tell him how amazing he is. Without him we wouldn't
be able to do half of this stuff. John, I'm going to interrupt. We've got hot sauce up here. Don't stick your dick in it. If you stick your dick in it, you've got to eat all of it. John should have just named it show Dan. People think I'm the guy that made
it because I'm Dan and it's show Dan and they just sort of put two and two together. I have to tell them calmly, no, I wish I was that clever with the code. I just make people like Paul M. angry. I hear collusion. I want to keep going. If you want to give us
money still, you don't have to have hot sauce. It's not really giving us money. We should invest in Rance's cyber pancreas. On that note, here's a cyber car wash. Why?
Why? All right. That's cool. Oil tanks. That's great. Yeah. That's fucking smart. Somebody sat down and decided I need my oil tanks on the Internet. It's the future.
This is how it must be. Who knows where ride pier is? I didn't look it up. Apparently there's substations on the Internet. That's cool. This one I've posted before. Does anybody
remember this one? The friendliest skater on the Internet. This is a caviar cannery that I think it's in Sweden. This one made news in Sweden and other various components of England. Not England. Europe. Sorry. England, Europe, same thing, whatever. I only have
two firing neurons and they're making me drink. You're behind. So yes, fun times.
This one? We'll make sure it stays warm for you. Can anybody read what I think is Swedish? Because all I hear is bork, bork, bork. It's something. It involves
temperatures and pumps. That's cool. This is cooler, though. It's a coal mine. Why would you let me play with a coal mine? What's better than playing with coal mines? I can think of a lot of things better than playing with coal. Potato technology. This was part
of my pirate baby cabana battle 2014 crazy bat shit rage fuel on Twitter. We scanned the Internet live on stage and we had 36,000 jpegs of random crap we found on VNC and I spent four days going through all 36,000 photos and picking out the interesting stuff and
flinging it on to Twitter and it got a lot of attention. This was one of them and I had no idea what it was until some random on Twitter told me that's actually potato climate control. Well, now you can be very comfortable counting to potato. Right? So
here's an Italian hydroelectric plant that's generating something. I don't speak Italian, sadly, but there's one line there that says it's generated 1,087 kilowatt hours, which is a megawatt, if I'm not mistaken. Almost. 1.087 gigawatts. This one is kind
of the same thing, but this is in Swedish, I think Swedish or maybe Dutch. Looks like an electrical relay station. Same kind of deal. Why in the fuck would you let me into
your electrical relay station over the Internet? Is that the Univision logo on the bottom? But would you know anything to do with it when you got in it? Indoor energy control. Hey, Dan, if you got in it, would you know about what to do with it when you got in it? Dan doesn't know what to do with it. Dan never knows what to do when he gets in. Hence why he doesn't know what to do with it. I know nothing. Why did
you even let me up here? What are you doing? Prank caller, prank caller. Conference rooms? Anybody? You can schedule a meeting. Apparently there's a port training project at 8 a.m. Rad. This one's fun. Who was at ShmooCon in the last two
years? Anybody? You remember MS paint as a service? You can do it over the Internet. This is a hotel lobby sign directly connected to the Internet that's accessible to the public. What if we made it say something like Ebola outbreak? How many shat pants would there be then? All of the pants. I am not a ham radio like
ultra nerd. I know a little bit. I know enough to make real ham radio nerds angry. Apparently you can run a D star, I guess this is a repeater off a Raspberry Pi and then you can put it on the Internet with VNC. All right. That's cool. I see
Brendan shaking his head yes. Right. Here's another one. Another wonderful office. Same thing like a hotel lobby but it's an office directory. Same sort of deal. Whose pants do you want to make brown today? What can brown do for you? Anybody familiar with Jenkins? The fun one that has groovy script with remote code execution? With VNC
on top of things. You can track boats too if you really want. I am not a boat guy myself but some of you guys might be. You can watch people day trade. This is like you want to get some insider information from some guy who is broadcasting
everything to the world. Or you can watch his solar system capture power. That's kind of cool. Yay power. I am not sure what kind of evil stuff you can do with a solar power system except maybe like fuck with the lipo batteries if there are lipo batteries but I am not an electrician. The dude in the pink helmet can help you there. Holy shit a guy brought a helmet. It just dawned on me. I was like I hope
you all have helmets and one guy puts on a helmet. That dude is prepared. Right? Another what is this? I feel left out. More hotel lobbies. I am sorry this is an office building lobby. Another like let's next. Oh, God. All right. So the
Echoplex is going to have a bad time at some point. Also for the sake of convenience you will see people that will put their security work station like the type of place you will walk into that has like dudes working a counter that have
security stuff happening and they man all the cameras and the badge readers. Say again? You can. Or you can watch them on VNC because it is fucking publicly
accessible. Or you really I don't know I am not a Redditor but there might be other Redditors in the room. Here is someone you can mess with. There is a dude on Reddit that is broadcasting his desktop to the internet. Have fun guy. So I have a funny story about these massive diesel generators that also have fucking VNC on them
for some reason. A friend of mine did a security audit for a power generation company a while back and realized that these things for the sake of emissions compliance have urea pumped into the exhaust area. I don't know if it's in the manifold. I am going somewhere with this and you are going to love it. And similar to
another slide I am going to have later you can open the valve and fill the exhaust manifold with urea which drowns the generator. Urea is the key component in urine and you can literally blast it with piss. Right? Or you can actually make it rain at
least for people that are really short. Sprinklers on the internet. I did forget one thing. There was the curtains I didn't put on here. You can find curtains on the internet too. Like that's fiendish I am sure. Functioning curtains that open and
close. Like computer controlled fucking curtains on the internet. You can open the curtains and switch to manual mode. Right? There is this other cool Japanese ham radio chat thing I found. I don't know if they are using ham radio as the back hall for all the networking but I guess. I was scratching my head a lot. I sadly can't read. Cool. What
is happening in Japan that let's nerds talk to each other over the internet? Who the fucking thought? Maybe Travis thought about it. I don't know man. I guess his AVG is
cool. I didn't find any threats. I ask again did anybody go to Bruce's talk this morning about risk? No threats. Your virus is clear. I can look at all your pictures
of somebody else. All right. I don't know if this was on purpose or if this was because management people need to watch Indians shopping for massive networking equipment but there is that on the internet too. That's pretty cool. I don't know what an oil
seller is but I think it might be kind of important and you may not want to tell the world about them or where they are or how much oil they have and things like that. Did anybody do med sec here? Check this out. Yeah. Fun shit right? You are going to
think. You are going to say but all of the fucking naysayers in the room. It's a fucking demo. It's a demo. Fuck you. I found a real one with 16 live hospital page. Come at me bro. Why? And you know what the fucked up part about this one is? This
was RDP not VNC so slightly off tangent. This was the background of the desktop. You know when you RDP into some hosts it gives you a login window over the background and you can just drag the login window off the screen and you see this full frame. So this was like you didn't even have to authenticate to the box. You just could sit here
and watch. That's good. Yeah. And this is another one. Fun fact. Tell me these guys weren't compliant. Tell me they didn't spend a million dollars a year on auditors to come in and fix their shit. Back up one slide. That one? Is it a hospital bed or a fucking hospital bed? Ask Amanda. Heart rate will tell you. Depends on the person.
What is that? Spoil everything for me. This is cool. I can't tell if it's a giant lipo battery but apparently you can control it from your old iPhone. That's kind of neat.
And the little icon on the bottom right hand, the little door, this means it's a touch panel. There's a lot of these things on the internet. All the stuff Chris is going to get into, some of it is mine, is all weird bullshit touch panel stuff. These
touch panels people buy and put on walls to control things you can VNC into with a default credential. Sometimes no credential. Fun fact. So this is another what appears to be really boring Mac VNC desktop except not. I'm going to take this one. It's the same
fucking guy. If you look at the name, it's the same fucking guy. So now we're getting the threat. Where's threat butt? I need you. No. That is a personal problem. That is a fucking personal problem. What are you doing? His first slide is a back to the future
slide. That's the first thing that came to mind. We're time traveling. Just wait. I got you better. It's way worse. It's face slappingly dumber. What? No. Just wait. There's more
cameras too. So geovision is a system that does like coax, those little dome camera type deals you see. That's fun. These cameras are really boring so you can get to this guy's XBMC install and watch movies on his tab instead. Or if you're really bored, you
can go to this Israeli pharmacy and order a bunch of crazy drugs and get high. That's shitty time, you have Agua Para Flushing. Cheers. Net coffee sounds cool. I'd sign up for that. I mean, I don't know what it does but it's got my attention. Really? Counter
strike? Holy shit, counter strike one six, nice. Well spotted. Obviously, lost poise. Good time. Yeah. And speaking of like crazy drug dealing people, here's $300,000. Right on. That's cool. And then here's an Italian something. I don't know. I don't speak
Italian. I actually stared at this thing and squinted it for a good 15 minutes. I have no fucking idea what this thing is. Maybe we can tap Chris with it. I know Chris isn't paying attention but that's cool. Other Chris. They're too busy scissoring. And my camera's over there. You didn't fucking wait. Can't count on you people for anything,
can I? Right? Is that the Spanish Minecraft sound? Because we have Spanish Minecraft. Phil is going to have a bad time. But I don't know. Like, I don't know. I
don't know. You're just going to make me drink. Right? But then again, you can feel better if you just watch a mender's game. That's cool too. The Italians like letting their team viewer licenses lapse on their 408 kilowatt hydroelectric generating facility.
Maybe you can forget about that by fucking with this guy's sprinklers. And if you're bored with that dude, there's another hotel. This one's in Oakland. If anybody's from the bay area. Voltage sensors are cool. I'm not sure what they're connected to. Maybe
there's a camera somewhere I can find that has something like that. Or maybe I can print some circuit boards because that would be cool. Who wants to hack some shit? You guys want to hack some shit? Who needs O'Day, right? Wait. There was an attribution talk that happened. Did anybody go to Morgan? Morgan did a presentation with another lady earlier today talking about attribution. Well, we can give them a bad time if you
want because there's like Cali on VNC publicly accessible on the internet and you can fuck some shit up that way and send Morgan for a throw, right? Or you can make some Spanish copies of stuff. So like all the people that were like, oh, God, 98, Windows 98, Windows 95, no, Windows 2000, right? Windows 1000, somebody else was
like, oh, no, the Windows 98 is bad. Welcome to my world. It gets worse. It gets worse. Wait for it. Wait. It's the same fucking guy. Again. Can you point out the
mistakes he made in his evil, evil hacks and his nefarious plot to overthrow the internet? No? Anybody? When was the last time you saw system 32 on DOS? Dell, EQ, echo, open some IP address, blah, seven, blah, blah, blah, I explore.exe on
DOS. Really? This is what we call our threat landscape, right? This is what we're up against, right? I'm going to try and open IE on fucking DOS. And what will really bake
your noodle is why the fuck is DOS available via VNC? How did you sort that shit out? It's an SSH tunnel through time. What the fuck? I don't know. I'm just going to print off a bunch of porn on whatever this giant ceramic printer is and that will make me feel better. I don't know. Providential, adjective occurring at a favorable time. You
can't make this shit up. I love it. You can't. It's good. This one is good, too. Same
guy. I think. I think. Yep. Same guy. On a Japanese system except McAfee is catching his shit. Can you read it? Probably too small to read. That's McAfee catching some kid, some skid doing some stuff. I think this might be the same Korean power
generation plan. Obviously I need to drink. At this point I don't even. This is number four. I don't. So when people go home after con, there's going to be a lot of shit to
play with, right? Especially more blind skinny derp. I don't know who white team is but they're dumb. Either that or they have scripts that are blindly pasting shit into every open VNC place they possibly can because that's what it looks like is happening. Cubs
win? I guess. I don't know. Okay. Sure. A lot of shouty arm waving why, what the hell. It's colorful times. But there's big German reservoirs. Wasser wurrungen.
This is why Germans don't play scrabble. I can't pronounce that. I'm just going to e-write. This one does something. I don't know if it's agua par or flushing but I guess we can check. There's also regular ordinary Swedish meal time with what also appears to be, it's
a show, man. You don't know about regular ordinary Swedish meal time? It's good for you. Right? It's good for you. But you know, if that distracts you, you can go back to the day traders again because apparently they're really happy publishing all their shit to the internet in public. Something. If you guys got something, I got nothing. It's
measuring it in meters squared. It's Polish? That's cool. Syslog is in English. I don't even know. This I got nothing. Isn't that Apple map? Right? Yes, it's a map. It's
fucking potato. It's Apple maps map. Potato. I will see your potato and I will raise you a hot parlor wash. Is there a happy ending? Yes. Okay. How many fans of BSD are there in
the room? BSD people? Yeah? How many people think BSD is the gnarliest, strongest, most awesome operating system that's the most secure? Yeah? What about now? Good job guys.
My single user mode. No creds. No security. Nothing. VNC. Right? What about now? Fun shit. Anybody lactose intolerant? Because we can have you have a really bad time. Here's a dairy plant. This one does something involving cows. Wait, what?
They're milking horses. Won't someone think of the children? See the really, really interesting shit? I think Chris has known the horse before. The really interesting shit
is I had no idea that was there. I didn't even notice it. When I find the shit it's like 4 in the morning and I haven't slept. I'm like look at this bad shit and saying stuff and then I get on stage and I have like all of you guys to point out all the stuff that I never noticed the first time around and it's like version 2 for me. This is amazing. Why the fuck is there a horse setting on the dairy milk plant? Why is
it still considered milking? Cannibal says it hides and not milk. This is where your children's milk comes from in their school. I said dogobetta. Standardized
testing. That's what that shit was all about. No wonder they were pissed. Is this what mulk is? I'd be pissed too if they wanted to milk my kids at school. User genu, I don't know, whoever is French in the room can help me pronounce that. But elite
31337X. Good job. What is it? Genuo? No. Yeah, right? No rag rats. Yeah. So one easy
way to catch skids is to leave VNC open and open note pad. Because they will blindly shove whatever the fuck they have into note pad and then you can have it. It's like an ultra poor man's honey. Who knew that note pad could be a honey pot? This is no shit. This is a note pad honey pot. Holy fuck. Right? I can go faster. Here's a TV
station that hasn't fucking updated their team viewer license. Here's another fucking TV station. Here's a goddamn ATM. Why the fuck is there a camera on a goddamn ATM? Why Genuo is going to shit his goddamn pants when he sees this. He's going to confess to
Luigi that he's been taking shrooms the entire goddamn time. Then he's going to turn off the goddamn Lieberts and all the data centers are going to go down. Right? Then the entire city of downtown Copenhagen, give or take a few places we can shut off for fun. There's an ice rink here that you can defrost if you have the minerals for it. The ice
rink is under there. Right? Webcams, too expensive. Cheap cell phones, better. Shady cops tracking you. What the fuck? Pips, auto play. Google it. Scary shit. Why are they doing that? I don't know. The EFF is investigating. I found a hydroelectric plant. No. I don't need to breathe. It's too bad Anthony's not here. There's a story
with this picture. I'll try to tell it really quickly. I found this. I put it on Twitter. Some guy said Michael, I don't know if he's in the room or not. He's not here.
Michael, I didn't know at the time, oh, no, that's totally legit. I said no, look at that fucking art, man. This is a defacement. Some kid did some MS paint bullshit on some skater and now this is his own. He said no, no, you can let the Java run. I said you're Java and you want shells on my shit? No. He said no, no, I promise it's okay. I spun up a VM and ran the Java and it said megawatts. I went oh, fuck. I put this
picture on Twitter and the next morning the DHS called me. No shit, it was like that. This guy was like I'm going to have some interesting people call you. I'm like, cool story, bro, Twitter, whatever. 830 in the morning, ring, ring, hi, my name is Anthony, I'm calling from the DHS. I'm like, it was bad. Right? This plant stayed online for like a year. Like, I
was driving, I have a distinct memory of driving somewhere at least six months after doing this presentation the first time like three or four years ago. And John Mathile, he's DMing me on Twitter, he's saying that fucking plant is still up. I'm like, which one? And
he's like the Fumel one. I'm like, oh, no way. He links me to it and it rendered on my phone. I went no, God damn it. We have a dam in your country that has flooded, if you Google for barrage de Fumel you'll find news articles about how this dam has flooded people in the past. They just don't care. They literally were like, we're on vacation, fuck off. No shit, they were on vacation and they didn't want to fix it.
Responsible disclosure works if you disclose to places that give a fuck and this place did not give a fuck. This place I didn't even bother disclosing to, God dam it. And neither did this place. We're up to three now. And then there's a switching station that is
involved so we're up to four. And I give up. Car washes. It's true. There's also speakers which is really fun. Because you can just send a Rick roll MP3 straight to a minute place. That's good. But how rich do you have to be to have a fridge just for the champagne and have the champagne have an alarm? Right? I want those problems. I don't
want these problems. That's CERN. To be fair, they fixed it. This is like two years old. I reported like 200 something of these to their CERT department and at first they
didn't really shit. We're this big open system for academics and things like that. That's cool. But like, no. I shouldn't be able to see this. All right. Cool. That's fun. They fixed it. It was really cool. Yay, CERN. I found a bunch of ski lifts. This is really funny because it's a gondola. You can open the doors, turn on the alarm and I
think, I can't remember, I can't read French. Shout at people through the PA. You can send people up in a gondola, stop the gondola, open the doors, get the fuck out. Why would you let me do this? Why? Right? This one is cool. I found a fishery in the Oxford
covered market in England. I went there and I actually put my hand on it. That was really cool to find some random bullshit on the internet and go touch it in meat space. But then I saw something. There's lobsters. You can fucking control the
temperature of lobsters over the internet. There's also swimming pools that have acid tanks that you can control over the internet. What the, why would you do that? I'm
going to take a breath. I will exercise George Carlin and I would like you all to consider following. Stop putting shit on the internet. Or for fuck's sake, at least count to ten before you decide to do it, right? I'm out. Next. You made me go first.
I knew he should have gone last. God damn it. Why, did I just burn all the time? I look better in everything. It goes right there, baby. Don't forget, we've got hot
sauce. We're at 300 bucks. Only 300? This room is not really full, but still, come on.
All right. My name is Chris Sistrunk. Get back in here. Don't leave. And I follow this guy. If anybody could float, I think he could just hover around with all the energy that he has. Electric engineer, skater dude, Chris Sistrunk. Let's get cyber-physical. Hey, hey, hey,
yeah. If you don't recognize that guy, that's Ralph Logner, the Stuxnet guy. Love you, man. Yeah, yeah. If you read the report on the reverse engineering of Stuxnet, he did it.
Very smart guy. Let's talk about top ten cyber-physical stunts. First, Side Dragon 1 made planes go sideways. Then Charlie and Chris made a car go sideways. Okay. What's next? Devian Olin and Sergeant Howard Payne making elevators go sideways? Yes. This is the
great glass Wonkavator. It's an elevator. It's a Wonkavator. An elevator can only go up and down, but the Wonkavator can go sideways and slant ways and long ways and back ways and square ways and front ways and any other ways that you can think of. It
can take you to any room in the whole factory just by pressing one of these buttons. Any of these buttons. Just press a button and sing. You're off. And up until now, I've pressed them all. Except one. Don't press anything, Bess. This one. Go ahead, Charlie. Please. Don't click shit, Charlie. No, seriously, there's an elevator that goes
sideways from ThyssenKrupp. So don't touch it if you find one. All right. Number nine.
Physical security fail. This is at a substation. And this happens all over the place. Also, I've seen where you have all the substations that might have the same
lock. Well, a substation had a homeless guy living in it, and he had a key. We have relays and substations, and that's a picture of one all around the world in America.
There's a picture of an attempt to do port security using a lead meter seal. Yeah, that's real secure. There's a substation that got shot. Metcalf and Keo in Arkansas that got set on fire. Yeah, that's Metcalf. Well, no, that was a different one.
Sorry. That was in Los Angeles. Yeah. Pretty serious stuff. So physical security is a pretty big fail. Pretty big fail. I'm going to keep drinking. All right. It's
a raspberry beer. That's fancy. Okay. Scans equals attacks. There's a couple reports that
came out in the news where scans from Iran to these company censors and honey pots and they called them attacks. And then a colleague of mine was scanning honey pots to
test his new NSC end map script, and he was from Chattanooga. And there's a nation state in Chattanooga. His name is to the hilt. So we have pew, pew, pew. Those are industrial control system threat butt there with a serial port coming out of his butt.
Number seven. He kind of touched on this a little bit. Smart phone apps that you can control systems with. What could possibly go wrong? Oh, well, I have stories. I have stories of things going on. Show me your honor. A colleague of mine said that they
had to go reimage all these machines at a glass plant. And what happened was the owner got a new iPad for Christmas and decided to put one of these Siemens apps on there and decided to configure, maybe optimize some of the PLC settings in the glass
plant. And then everything quit working. And so she had to go reimage all of the machines back to like three years ago because that was the last image they had. And I've also seen a hospital, you know, every hospital has a generator and they have a
plant operator have control over the water plant with a smart phone. So not a great idea at all. What could possibly go wrong? Yeah. Number six. Anonymous FTP. First one. Me
and a couple of other guys, we do this in our spare time. We search anonymous FTPs. We found a skate engineer like me but not as dumb as me. Maybe dumber. He backed up his entire work laptop on his home terabyte hard drive. And so what we did was he called him on
an anonymous Google voice number and called him and said, dude, you got your work laptop backed up on the internet. You should probably take it off. And he was like, what? Who are you? You had one job. Yeah. That's right. You had one job. Don't
bring it at home and don't put it on your anonymous FTP backup. And then we also found a city in Florida backed up their entire SCADA system for their electric grid and all the configurations and all the drawings and everything else on their anonymous FTP login. And this is all found with Google, okay? So we called ICSR and we called them and
they finally took it down. But it was pretty serious. Also we found engineering companies had schematics projects, all these different control systems, prison control system where you could let the control system for the doors open. We also found the air
force bases and we also found like the top secret room where they meet. We found all the plans for those. And we reported those in. That was pretty wild. There's all kinds of things you can find on anonymous FTP. Kind of like what he does with scanning the internet. So we had this thing on Twitter called we are the artillery. All of us
been finding these things in our own time and trying to get them taken down. Poor architecture. Any rules, anybody? There's lots of those in oil and gas.
CISSP certified. Yes, exactly right. So we have lots of problems in industrial control systems. Not in the electric sector for these but they still have some failures too. Also oil and gas and water, they have flat networks. Not a very good idea at all. And then number four, there's squirrels. That's the number three
cause of power outages in some areas. No, it's not number one. Number one is acts of god-like weather. Don't listen to Jericho, okay? That's cyber squirrel one and then
there's mylar squirrel. Follow those both on Twitter and they'll tell you all the power outages that's caused by squirrels, rabbits, birds, snakes. I have a picture of a very nasty fried squirrel. Like took down our entire data center. Okay, I'll go
faster. Vendor excuses. Risk is accepted. So there's a Twitter account that a friend of mine and I run. So I'll let you read some of these. And these are actual real excuses that we've gotten from vendors after we found vulnerabilities in their stuff. We received a vulnerability report and decided that the best course of action is just to
continue this product. We reviewed the proof of concept frame you submitted but our engineer says the valid end point wouldn't send that. The bug wasn't ours but it was an open source project we use and do not fund or contribute to in any way. A backdoor
password was discovered in our firmware. We've changed it. Thank you. And there's a whole treasure trove of those that we put up on vendor excuses. You can actually send your own vendor excuses to, we have the email set up. And then we have this guy. He already gave this part of the talk, ICS on the internet. When someone asks how your
control system was breached. Me. So we found this. Sorry. Sorry. Sorry but not sorry. God dammit what the hell. Why? Can you say that to me real quick? I found more. But
I'm not going to go through all these. I've got just a few slides left. Found a distribution substation. The turbine system seems pretty cool. Oh yeah. We found wind turbines. The milkman is interested in turbines. Have you seen the milkman? Yeah I'm telling you. We found a Houston data control center where you could go and look at their webcam and then you could move their webcam and then someone moved it back. And
then they had like DMP3 and Modbus talking from there. So you know it's a real control system. And we called them and told them to take that stuff offline. I don't always connect my control system to the internet but when I do I use IPv6. That's safe right?
And then the number one. Skater hackers. That's Jack Daniel if you don't recognize the guy. His beard is an IOC. We had 15,000 skater hackers at DevCon last year.
last year. And they went to the ICS village. How many people in here have been to the ICS village yet? Okay. Great. That's awesome. We had a whole bunch of people last year. What do they use to attack this stuff? Burp suite. That just means that they're not using any of the control system protocols at all. They were trying to attack things that really didn't exist or
anything like that. So let's get them on the mod bus. Let's take you guys down to the ICS village. And we even have a cartoon. I don't know if you follow Robert Emily on Twitter. He has little Bobby talking about mod bus, DMP3, ICCP. So we were teaching these people about
the protocols. So we wrote a script called mod turnt. And it turns on the lights and then you turn down for what? And you turn the lights off. So that's all. We have some shout outs to Adam Crane, to the hilt, Robert Emily, Mike Tucker, all my skater brothers. And
then my wife who is somewhere here. I don't know where she is. There she is. I love her. That's what she said. Holy shit, this is terrifying. Anyways. Any time now. This is
great. This is awesome. Someone ring the fail bell for me, will you? Anybody good with computers? Larry, you're not helping. I'm trying the computer. There we go. Yeah. I fixed my
shit. Anyways. So when Larry, I got a drink again? Okay. Oh, that was not my
original drink. Okay. So as you can see, I thought of mine back to the failure. Thanks to ill will for making this slide for me. I really appreciate it. One thing I forgot though was it still says Steven Spielberg and shit. I don't really photoshop at all. So I
just crossed off and there's my name. So along with my name, so Chris because that is really my last name. I'm a senior technical advisor for rook security in Indianapolis, Indiana. I consider myself an infosec nobody. I have no O day. I don't do
anything really cool but I love the profession that I do. I have no relation to Joe blow or Curtis blow. I want to get that part out of the way right now. If you do want to follow me on Twitter, feel free to go ahead. However, you get to see pictures of me wearing a wizard hat which goes great with Dan's robe. You see pictures of my dog or pictures of
stuff I make food wise or you see me drink. Usually drink. Feel free to follow me if you want them. Let's talk about firewalls though. Before I talk about that, let's talk about Dan's talk that he gave at layer one this year because it relates to what I'm going to talk about at least in my next slide. So it's actually a really good talk about
failure. So if you want to see even more failure after this, I don't think you can get any more failure than me talking up here. If you want to go, go check it out. It's great. I think it's another fail because I think that link actually goes to the certain time mark in there to, you know, so you get to see this picture of this like this. More Dan. As if you didn't take up enough fucking time up here. Somebody had to say
it. Come on. That's all right. He did. That was like early 90s. How old are you? No, sorry. Anyways. So anyways, let's get into some fails. I'm really going to talk about a lot of
fails that I've encountered myself over the past ten years. Probably more like the last five years. But a lot of these different failures are, you know, ten plus years old. So going back to Dan's bit, we're talking about international call center here. That's all they do. Call centers all over the world. They wanted a typical PCI DSS version 2.2 pen
test. And pen test is in quotes for one good reason. That usually means we want you to run end map. Give us a custom report. Don't touch any of our stuff but go ahead and scan it with Nessus and give us a report and show us that we're great and that we passed for
the year. So as we continue on, you know, I find out that these firewalls are running at over 90% saturation. I don't feel really comfortable talking, you know, when I'm talking to these guys saying we're on a scoping call and I'm like, hey, do you really want me to do this during the day? And they're like, yeah, it's fine. We do this every year. Go ahead. It's fine. Okay. Great. I'm trying. I talk faster than, okay.
You know, we've got this 90% saturation going on and then I do a firewall review on these guys and find out that their OS is at least 8 years old if not older. So between that I took down an entire international calling center by using end map. That was great. I
dropped over 3,000 calls. They were really pissed off and I'm like you told me to scan during the day and I'm on this call with all these executive people and they're like what did you do? And I'm like I ran end map and everyone just went silent. It was really annoying. And they had alerts that were set up to look at things like if a firewall was running over 70% saturation. All of those were disabled. So then we get to
the external pen test and we find out they've got open RDP. So that was fun. They also had MSO867. Oh, and they had absolutely no D and a Z. So with all that being said, domain admin credentials were pretty easy to find. They are very angry with me still. So moving on. Let's talk about social engineering. So when I think of social
engineering I think of the social engineering tool kit. Thanks to Dave Kennedy and all the folks at trusted sec. I mean that wholeheartedly. I love that tool with all of my heart and I love what Dave's done with it over the years. Dave Kennedy is a great guy. He's awesome. And you get to see him all the time. But when I think of Dave Kennedy most of the time I usually just think of clowns. I really wish he was in the room because he
would be shitting his pants right now and running out the door. But unfortunately he's not. Now what's funny about this is I needed to get that image of the box of social engineering tool kit from his site. So quick side note, this is what happens when I go and grab that image from his site. And if you want a little more detail on it, it's like, oh,
look, this stuff's malicious. There's been malicious things that come from the site or whatever. But I downloaded it anyways because YOLO sec and you needed to do that. Were you using IE? Yeah. What? Okay. So for this next one, let's talk about a financial institution when it comes to social engineering. They wanted me to come in and do
an email phone social engineering deal with them. That was cool. They bragged a lot about how they had a bunch of info sec training, had a bunch of instant response training. They were set to go. Nothing was going to get past them. So we started talking about the scope of the engagement. So you're going to set up a hey, get a free iTunes gift card email and stuff, right? So they're like, yeah, come at me, bro. And I'm like, by the
time we actually got to what I was going to do, they were like, holy shit, you can't do that. I'm like, well, do you want a real test or not? I feel really sorry for the person transcribing this right now. I'm really sorry for whoever it is behind the keyboard. I don't know. They probably won't talk back. This is a real person, right? We
already discussed that earlier. That was a person's talk. Anyways. Yes. Right there. I'm really sorry when I use the word shit and fuck a lot. Anyways, so, keeping going. So
do a little bit of research and find out that their SSL VPN is just sitting there whiteout in the open. Nothing special about it. So the place where this was happening, they had a bunch of current weather events going on that was snowstorms and ice storms and everything else. So I decided to put that in an email and put that through a relay and be like, so, due to recent weather events, we're going to start having more people work
from home. Click on this link, download the new VPN software. 78% rate hit. That was awesome. The best part was not only did I get current passwords, I got their entire password history because people didn't think it worked right. What could possibly go wrong? I got nine slides left. I'm going to be quick. There really is, isn't there? Let's
talk about my favorite subject. It's really not. Let's talk about PCI. PCI is great. I just put this slide together. It's a whole bunch of shit on the screen there. You got Windows XP because that's pretty much all it is. Apparently you can get the certificate of compliance with PCI and that's kind of fun, too. Yeah, that's a whole
fail. Keep hitting that button through this whole PCI thing. Let's talk about, that's my corgi by the way. Top four responses to noncompliance. Number one, it's too hard. I can't put that in your report. Number two, write a compensating control for it. I cannot write a compensating control for the fact that you have a lockout duration of 20, it
takes 28 failed attempts before it will actually lockout your account. I can't write anything up about that. I'm sorry about it. The fact you do that is really fucking stupid. So then I get, oh, QSA last year said it was good. That's great. I'm not that QSA. I'm really sorry. I can't accept the fact that whatever this mess is a report that I'm
reviewing actually passed. So then they're like, we'll just accept the risk. That's great, too, but I can't do anything about that. So that's always fun. So anyways, let's talk about, can I help you? I do not need to drink right now. I'm trying to keep going then. So let's talk about a rental car company, a very big rental
car company. I had to be the technical QSA, which by the way, those don't really exist. That's really, which is really fun. So I'm going through all of these credit card, you know, they've got all these credit card applications. One of them is this terminal they've got. And I'm like, oh, that's cool. I need all these T logs, I need all these application logs, SIS logs, et cetera. So, you know, I find credit card
numbers in the logs and I tell the developer, hey, I've got credit card numbers here. And he goes, no, that can't be right. I'm like, well, it's there. That can't be right. We don't store credit card numbers. It's great. I've got them right here. So then we get a little farther and I'm like, oh, by the way, that's actually track one data in your logs. And I'm like, this is a big problem. And they're like, well, we don't store credit card data. That can't be right. I'm like, I don't know what to tell you, but
you've got them in there. So just to prove this point, I was like, how recently are these logs? He goes, oh, it's from the past, you know, two or three days. I was like, okay, hold on. So I get a credit card scanner out of my bag, connect it to my laptop, swipe it, same one that I used. It was my track data that I found in those logs. So not only was my track data in those logs, but we go back and it turns
out there was this poor QA change control process. So those had been, it had been storing track data for a couple months before they actually shut it off. It took going past a vice president before they would actually admit that they had accidentally stored data and it was something where they had implemented a new version, they forgot to turn
off the debug log function. So that was awesome. I'm going. So I got two more things to talk about here. So let's talk about a logistics company. And we're talking about people that do self-assessments. People love doing self-assessments because you can just go through, take this checklist of 12 items and be like, done, done, done, we're good. So they declined to do any kind of PCI data discovery workshop. That was
always fun. So I'm like, okay, we're going to have to go off what you say. They say, we've only got six in scope applications. Okay, great. 24 hours later we find out they've got at least 15. And then they got angry when we're like, we need a change order so we can actually assess your guys' stuff. It's always great. But there
was credit card numbers for everybody and it was all over the place and it was in notepad, it was in the notes on some of these apps, it was fantastic. So, okay, last couple slides. Talking about red teaming. Red teaming is definitely in quotes because every time I do a red teaming engagement, it is never a true red teaming engagement. So let's get past doc here. Come on. Okay, so we've got a retail chain. They want
to do a red team exercise, performed on some of their retail stores. That was fun. And doing a little bit of awesome, find out that they've got this huge party list that they do for their Christmas party every year and it's got manager names, store numbers, et cetera. However, a lot of that didn't really help because as a lot of us know, retail can be an employment revolving door. So I had no clue what to do for this.
And I walk in and I'm just like, oh, they've got Verifone machines. I'm going to be a Verifone guy. So I go in there, you know, I'm in like polo and khakis or whatever. And I'm like, hey, I'm a Verifone guy. I'm here to check on your new systems and da, da, da, da. And I thought I was in the door. So I'm like, rock and roll. Let's keep going. So, you know, we keep, I keep going through stuff. I've got a wonderful Pony
Express power strip and a couple other things in my backpack. I'm like, I just need to replace the UPS you guys have under your desk. Do you mind if I go behind registers there and connect stuff in? They're like, sure, no problem. Well, the problem was that place was a cellular dead spot in a certain mall that I was at. I couldn't get AT&T, Verizon, you name it, I couldn't get a single cell phone signal to save my life. So
that was great. However, I did find a mobile terminal. Those are fun. They're even more fun when the passcode is the store number, which I'm sure nobody is shocked at. So as I keep going back and changing out all these cellular cards, eventually the NOC calls me and they're like, well, they called the store and all their POSs were going down and
coming back up, going down, coming back up, what's going on? And they decided to talk and say that a Verifone guy was on site who was being very friendly and helping out. And that's when I started to cry and, you know, it was like, well, this might be game over. I got out of there without having to show the little get out of jail free card, but still that kind of sucked. So last two slides. And I really can't make this shit up because this is a failure not only on the company's part but more so on my
own. So I went to go do some work for an auction company, do a lot of stuff with automobiles, pretty much anything with a motor, do a lot of stuff with memorabilia, anything like that. And the best part was I couldn't get in the front door. The woman there, I went in there as that picture shows as an exterminator. And she's like, we've been using XYZ exterminator for 30 years. Who the hell are you? I was like, shit.
This has never failed before. I really wasn't expecting that. So I ended up, I made up this big story about, you know, oh, I'm a contractor, da, da, da, da. We kept going back on and on. And they never let me in. But I went around to the back door. That was open. And, you know, just kind of went wherever I wanted from there. I did that to all
three sites. So PII was everywhere. And I'm not talking, I never even had to plug a computer in. They had photocopies of driver's licenses, photocopies of car registrations, photocopies of people's credit and debit cards, photocopies of checks, photocopies of anything you can imagine. Now, granted, I would have to take a large duffel bag in there in order to get this shit out. But it was very easily
accessible. And no one would have been the wiser. The bad part was when I got to the debrief. And that was the next week. And I was like, hey, you know, look at this. I owned all this shit and I didn't have to even connect a computer, da, da, da, da. And they were like, wait, go back to that first one for a second. Did you make it to the second floor? And I'm like, no, no, that was right behind the receptionist's desk and she wouldn't let me in. They're like, our office is on the second floor. You just
owned one of our competitors' companies. It took every ounce of me not to say the word fuck on that phone call. So, you know, not only is there a failure still in, you know, infosec in general, but I'm still a dumbass myself. So getting off the stage
here, but, you know, if you guys, like I said, if you want to follow me on Twitter, go right ahead. If you have any questions or whatever, feel free to e-mail me. Thank you very much. I have to dance, right? That's intermission music. Depending on how
much money you put up in this charity jar. Is there like an unventilated can of varnish somewhere near Chris? No, he's always like that. We'll all dance. He dances for
no money. How much money have we raised? Not enough. Come on. $650. You are lame. Let's get it to a thousand. Come on. Lame. Come on. Why is everybody leaving? What
the fuck? Come back. Come on. I swear my part will be way better than theirs. Come on, stay. We know how to computer, kind of. Who told you you could eat my cookies?
That's some hot stuff. I can smell it all the way over here. Do I need some more intermission music? That'd be good. No, I'm tempted to make fart noises. Are you
ready? All right. So originally when Larry got me to do this talk, he said it was going
to be a holds barred type of talk where we could just talk shit about everyone. And then I found a couple special snowflakes that kind of shot me down. So I'm just going to tone it down a little bit. Originally I was going to do like an offshoot of the
joke, the aristocrats, to start off with. I feel so bad that Amanda is following this. Is there Oday in here somewhere? I hear you can't speak unless you drop an Oday on stage. Originally the first line of the joke when a gender fluid social justice warrior
named Caitlin walks into iron geek's office and asks for a raise. I was going to snowball it from there. Boo. So who I am? I'm ill will. Professional IRC troll.
IT consultant. I also run a non-profit hackerspace. I don't have any certs because fuck certs. And I'm black hat as fuck. So when I started off with computers, I liked to have
fun. Me and my crew, we used to roll around. We brought you the world of Paris Hilton. And I'm sorry for that because it's like opening Pandora's box if Pandora's box smelled like herpes. We also brought you the world of Fred Durst O face. If you can burn
that image out of your mind. So unfortunately that brings a lot of attention to yourself. I did get in some trouble at some point. When you do get in trouble, you get
arrested and you think it's fame and fortune and you can talk about bullshit stuff like mittnik all day but you just get a shitty movie made after you. So basically this is going to be talking about doxing. So one of the famous fuck ups was like rust from silk
road who got caught because he basically posted on bitcoin forums and some other shit with his own email address and decided to start up silk road. Not scrubbing all this shit after the time because everything that goes on the internet stays on the internet. Another fuck up is this big snitch. He was doing pretty good until he
logged on to IRC using his own IP address for getting a turn on tour. In effect, getting this guy in trouble. So he had pretty good op sec. Unfortunately he trusted a snitch. And
also his password for his computer was chewy123. So you have all the encryption in the world, the tour, but if you fuck it up with any character password, you're fucked. So raise your hand if you think your email address is in this dump. How many of you
people shit when you heard that one out? Yes, but not for that reason. So basically there's 50 million users on there. If you break it down, there's a couple thousand federal state employees, FBI agents, that all have nudes. All the girls that they're
talking to. So when that shit gets leaked, you don't want it to leak. iCloud was another big one over the past year. From all the celebrities over the past years that
were hacked into, they still don't learn to trust the cloud with all the nudes. Normal people fuck up, too. So this isn't any celebrity stuff. This is just stuff I come across in my day to day job. Let's see if I can get this thing to play. Just wait for the
audio. It's not playing. Oops. We can probably. Let's see. Hold on. Let me get the
audio. If any of you can recognize this sound, please shout it out. This wasn't the
Bally's pool last night either. I was working on a client's laptop. They had brought it
into me. It was in standby mode. It's still going in the background. They brought it in. I'm working in an office full of a bunch of people and that goes off. I had no way to shut it down other than shutting it down. Another fail. When you bring your computer
into somebody to fix, you don't have a folder labeled my escort site on top. And in the other folder, classroom material for kids. So I had this other lady bringing a
laptop. She brought it into me. Had powder all over the laptop, the keyboard, everything. Thought it was a weird thing. She had a user profile that was messed up. Fixed it. She said her kid had messed it up. I said I'll turn on the guest account and that way
your kid can't mess it up. She brings it back two days later. It's messed up again. Fixed it. She's complaining she shouldn't have to pay again because it was broken. About three days later, I got an ass dial at 3 in the morning from a phone number. Me being curious, I Googled it. The Google search pulled up her phone number which led to an
adult baby service. It wasn't actually her kid. It was her adult baby diaper guy. If you're going to use the phone numbers for all that stuff, don't leave it anywhere. It's a thing. It's a thing. Google image that shit. So the last thing is going to be like
health care. For my wife's mother in law had bought a laptop at a flea market for 50
bucks. She called me up and said I need a password removed from it. I just bought this healthcare provider. For the provider itself, as you know, you can get the MS cache password and log into stuff. Instead of removing the password, I decided to crack it. That
led me to get on to the Citrix framework for them to log into their server. They were curious enough to basically let me get onto their main domain controller from a link on the desktop. So, of course, me being curious as I am, I had donned my hacker mask and
started searching around. Not only were they curious enough to leave the remote desktop link on their desktop, they were also curious enough to leave an Excel spreadsheet with
every single user password, every single Wi‑Fi password on the box. I did that in 2003. I checked again about ten years later and I was still able to log in with the same user name and password and all the same stuff was there. I did see somebody at
besides Boston last year that actually worked there and I let him know that I had owned his whole network and I gave him all the information. I gave him my card. I checked again right before today and everything is still not changed. This is just a shout out to one of my buddies here. When I got in trouble, there was somebody that
contacted me a few months ago that got me into all this stuff. I wanted to say hi to Dan if he is in the audience. Also, if you are any type of CSSP, like Boris, last time I
seen him, I don't know if he is here, last time I seen him at the queer con pool, sweating vodka. Just to let you know, everything you put on the internet stays on the internet and someone is going to find it eventually. I had to rush through this because we
only have like ten minutes left. So we are good to go. Can you see it? I have like 30
seconds so this is going to be awesome. First time speaking at DEF CON, I don't have a drink so I'm not sure how that works. I hate beer. That's horrible. A little bit about
myself, I'm going to talk some about a healthcare provider that I worked at, an ISP that I worked at, and a little small time that I spent in education. I'm sick, I'm sick. Oh, perfect. So my name is Amanda Berlin, info sister. I have my fan club like in the first
couple of rows. So, yes. I've been doing blue team stuff for a long, long time. Worked
out a lot of shit. Next. Yeah. So still doing some hot sauce for charity. That isn't charity as far as I know. So get up here and give some money. And a little bit about
me, adult supervision required. If you hung out with me at any point in time, these guys can probably vouch for that. Yes. Run. Otherwise I wouldn't be up here on this panel. This is one of my favorite kids movies. I have three little boys at home. Not so little
anymore. But this kind of explains pretty much blue team and red team. Red team is just cooler but fuck it, I've been doing red team for ten years. It's a lot of fun. So just wait for the next slide. Cover your eyes if you're squeamish. That's a thing.
That's what you have to do to get your CISSP, I think. Describe the CIA triangles. He got forked. A little bit of process. Everything that I mentioned has been fixed already so don't try and go fuck up my previous employer because I really still do like them. It was one of the best jobs I ever had. Got a lot of experience. Wouldn't be where I am today
without them. So imagine walking into an environment that there's absolutely no help. The network grew with him. They switched to an EMR. They completely digitized everything and he
had no other knowledge other than the one-week MCSE boot camp that they took. And they knew things were bad. I'm a self-proclaimed sexist but he was really bad so not really
involving infosec fail but I was pregnant when I was working there and this dude came up and said every time that I see you, you're eating. You must have an oral fetish or oral fixation with me. Ah, fuck off. So he got fired surprisingly but they actually were
scared to fire him because he knew, he supposedly knew so much about their infrastructure that they didn't want to fire him because they weren't sure what exactly what happened if he left. Um, I got there, we started out with everybody in the entire department as a domain admin. Forty or so people, anywhere from help desk to
directors, uh, to software administrators to the people that actually needed it and actually knew what the fuck domain admins were. Um, and it just, we dove in and we finally realized what exactly was happening. So a couple things that we didn't have.
Didn't have anti-virus on anything. Servers, workstations, nothing. Welcome to my world. What could possibly go wrong? Um, had no WSUS. So we had Windows 2000 servers that hadn't been patched in four years. You know, no big deal.
Didn't that get into like Windows 2003 server territory? We had a couple server 2003s, yeah. It was in 2008. No biggie. Um, we had a decent data center. There were water lines piped above them for the fire suppression system for our entire data center. Uh, yeah, we had open ports everywhere in the hospital. Um, we had no idea what was
in our environment. This was after we spent about 40 hours cleaning it up. We had this isn't really infosec, but holy shit. Like just cable fail.
We're up to $700 by the way, everybody. Yes, nice. Yes, keep coming. Come on. Come on, come on. I'm trying. I'm trying. Sorry. I have like 10, like, I'm half done. I'm halfway done. Okay. Oh my God. First talk ever. We know Larry can go in two
minutes. All right. So we had no backups at all. We were running a fucking hospital. Uh, 500 beds, you know, 2,000 employees. No backups at all. Um, had no DMZ. Not only did we
not have a DMZ, um, our production website was on a Windows 2003 box, uh, who was dual homed. One access, one had a public IP address to the internet just straight plugged into it. The other IP address went to our internal network because the, it had to have access
to that because the SQL back end was on our domain controller. We just accepted the risk, right? Yeah, we accepted the risk. It was fine. What could possibly go wrong? It was fine. We were compliant. It was great. Um, not only, not only was that on our, on our domain controller, we also had the, um, our, our public Wi-Fi actually, that
was where the DHCP came from. That Wi-Fi had no password. Actually had a lady call me up when I still worked in the help desk saying that her internet wasn't working, um, down the road. So some, some old lady just called up. She thought for some reason it was
our help desk. We had like a splash page up to call the help desk. She called us, let us know her internet wasn't working. I'm sorry this guy really supposed to be your internet, but it was. She had no idea. Cyber. Cyber. So if anybody's in healthcare, this is a cath lab. This is one of my, one of my favorite stories. Yeah, yeah, yeah. So,
um, they do some stuff with like heart cath things where they open you up and do, and do certain things. Um, yeah, right. They, um, actually had, are you gonna pull me off stage? No. Get the fuck out of here. Go. Go. Go. I'm done. I'm almost done. I
swear to God. Next time I'm going first. Fuck this. So, um, we had our, we had our operator call about, about massively fast locking out Active Directory accounts. We actually had to write a script that would re-unlock the Active Directory accounts
because the cath lab vendor shipped us something. Guess what was on it? Enterprise admin access. Shells. Um, the porn that the CEO watches. A variety of colorful dicks. Ken
Ficker. Welcome to my world. That's better than a bunch of colorful dicks, only forerunner technology. So, so they, yeah, so they shipped us with Ken Ficker. Um, it completely, we got a really, we got a really good discount on this software. Really good
discount. Because we swore we would never say what their name was, um, when they shipped it to us a second time. Oh, sorry. Oh, okay. Whoever's transcribing this week. I'm so sorry. Alright, so we also had MS08-067 everywhere. Ken Ficker,
which I already mentioned, and Windows 2000 and XP. No big deal. This was actually a water fountain in, it wasn't supposed to be a water fountain, was actually attached to our boiler. Something happened with our power. The squirrel that I mentioned earlier took out power to our entire data center. See, I told you. And, and, I'm
really scared this dude's behind me. He's gonna fucking throw me off stage. He's gonna throw me off stage. 5 am! Literally, I walked in at like 9 pm at night, there was a 5 fucking foot water spout coming up in the, where our, where our, um, uh, where
it, like, where our fiber terminated. Every, I mean, it had our core switches, it had every, I mean, it was, I had to daisy chain a UPS and actually put it on that ladder so it didn't, didn't get fried by the water that was spouting up in the corner.
Best alerting system ever, yeah, best alerting system ever, uh, we had no monitoring, so best alerting system ever was our APCs. Any time you did an end of map scan, it would just send us an email for every single fucking one. Uh, I'm gonna skip that one. So, I have some personal fails. Yeah, sorry, not, I don't have any personal
massager fails, that's a whole other talk. Um, if you mass scan a Fortinet, it's a really bad idea. I've done it. It's colorful. It is very colorful, kind of takes down the entire school system. Yup. And everybody that you manage. Yup. So, and, and
checkpoints, which I probably shouldn't say. Next generation firewall. Next generation, great. So, last slide, thank God, um, I actually did a phishing ex, um, exercise to train the users in the, um, in the hospital I was working at. Went really well, I have a whole other talk on it. This one was amazing because as soon as I sent this out, I got,
I mean, a little bit later, I had a lady contact us and let us know that she really didn't appreciate it because she had to cancel her PayPal and Kohl's card. I felt really bad. So, I actually sent this out as a phish, um, and I'm done. I'm done. I'm done. Great. Sorry.

Recommendations

Thumbnail
Thumbnail
Thumbnail
  Series of 85 media
Thumbnail
Thumbnail
Thumbnail
  Series of 322 media
Thumbnail
Thumbnail
Thumbnail
  Series of 109 media
Thumbnail
Thumbnail
Thumbnail
  Series of 112 media
Thumbnail
Thumbnail
Thumbnail
  Series of 122 media
Thumbnail
Thumbnail
Thumbnail
  Series of 335 media
Thumbnail
Thumbnail
Thumbnail
  Series of 93 media
Thumbnail
Thumbnail
Thumbnail
  Series of 84 media