Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

DEF CON 18 - Jackpotting Automated Teller Machines Redux

 

Rating :

 

Comments

 
  • shubhragupta
    shubhragupta at April 03,2017
    Really enjoyed watching this video. The video demonstrates how pets are being used to deal with people. DEFCCON 22 has the basics of using animals for pen testing etc. He demonstrates how animals are being used in miltary operations and how difficult it is to deal with cats. Critical information can easily be shared through wifi network and how dangerous it can be.
  • thorner
    thorner at April 04,2017
    Really liked this guy - he was good at keeping the audience's attention, as well as mine. Very cool idea to tweak the idea of working animals (service dogs, military/police dogs, "acoustic kitty," etc.). Letting a dog or cat roam and pick up unsecured wi-fi spots and collect data is an incredibly efficient (and a little scary) idea. This would definintely need to be an animal that is well-trained, active (covers a lot of distance), and comfortable wearing a jacket. I know my dogs and my cat would definitely not be ideal candidates for this experiment. As far as the denial of service dog...I think "nice doggy!!!" would have been my response as well :) I think the main lesson of this video is "try and try again." Seems like he went through innumerous tests, prototypes, and contacts to finally get a working "war kitteh" and "denial of service dog."
  • ftj258
    ftj258 at April 06,2017
    I had a smile on me the whole 37 minute. How does he talk so fast and still entertain us so much. Very good sense of humor and he is very smart. He also knows very well how to keep his audience pay attention to him. Enjoyed the video thoroughly. I am not even complaining about the time. The idea itself is very interesting. I will not be surprised to see all the pets of the neighborhood carrying this gps and wifi hotspot gadgets around by next year. Well atleast next door's Mrs.Brown will not loose her cat and go nuts!
  • echukalov
    echukalov at April 06,2017
    The presenter certainly speaks fast, but it was entertaining. It's great how some security conferences like Defcon and Derbycon are very informal, rather than bore the audience to death through an hour long presentations. I'm sure this person is not the first person that thought about weaponizing their pets. There are many "wearables" that are being developed for cats and dogs today, and some of them could be used for similar purposes. I've seen dog collars on the market with built-in camera and mic. The device can stream live to an app on your phone, over wifi so people can see what their dog is up to. There might be some other ones that also include GPS module. I'm sure it's much easier today to weaponize your pets, and you might be able to do it without any soldering.
  • bschmid5
    bschmid5 at April 28,2017
    This video was published on August 19, 2014. The speaker, Gene Bransfield, Principle Security Engineer at Tenacity, presents an absolutely hilarious attempt to “weaponize” household pets for hacking. Tenacity Solutions just happens to be located in Reston, VA. The first was the attempt to use a cat to perform war driving (scanning for open Wi-Fi networks) in a neighborhood using a Spark Core (Wi-Fi in front, Arduino in back), a GP-635T GPS chip, and a MicroSC breakout board in a custom cat collar. The second was a denial of service dog using a WiFi Pineapple, TV B Gone, and a doggie backpack. The individuals would walk around with the “Denial of” Service Dog walking into restaurants and big box retailers turning off TVs and spoofing WiFi connections. A very entertaining and enjoyable presentation. Well worth the time to watch.
    • «
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved