-
ftj258
at April 06,2017
This was very educational. Interesting video but got a little bit complex on the process of the php bit reduction process. Still it makes you think that you are basically giving away your locations every time you use google maps and directions. Even if google secured it there will always be someone smarted to outsmart them. There is no way of staying incognito anymore. Even if you wanted to get lost you couldn't. Cellphones and cars having built int gps are contstantly giving away your location 24/7. People could get their hands on that info if they really want to. Privacy indeed is dead. What happened to the good ol' days when the only way of communication was in person or messenger bids and pigeons.
-
thorner
at April 18,2017
Loved this video - very in detail and walked through it explaining each point and the strategy behind each step. Some of the stuff got a bit complicated for me to follow, but I liked learning about NAT pinning and how to locate a router. I had never heard of some of this stuff before; makes me realize how much is out there that I don't know.
To me, this seems like a ton of work, complicated steps, and lots of time required, but I guess for an expert hacker this is simple stuff and they can get this data a lot faster than I would be able to.
Geolocation stuff is a little unsettling, but not suprising - especially with all of the location-based apps and picture data these days.
-
bschmid5
at April 20,2017
This video was originally published on Nov 5, 2013, so I have to wonder how many of these exploits are still valid after four years? Prior to this video I did not have a clear understanding of how simply visiting a website could attack your system as demonstrated with the NAT pinning example. Given the ease at which individuals such as Sammy Kamkar can exploit your system and network, it only makes sense to follow through with the common sense actions such as running a strict firewall on your router, make sure you change the default router admin password, patch all your software to the latest versions, and run a second firewall on all your individual systems to supplement the firewall on the router. I will also now think twice about responding to website requests that ask me for my current location. While this video did not delve into that specifically, those requests suddenly take on a whole new meaning based on what was discussed in the geolocation portion of the video.
-
echukalov
at April 24,2017
This is a very informative video. The detailed explanation about all the different attack vectors that were used was a bit too complex to follow. Bottom line is, if someone has enough time and determination, they can track you no matter how careful you are.
-
pneyzari
at May 01,2017
We went from the discussion of cookies and their binaries to hacking into someone's FaceBook profile and sending malicious codes in order to reel someone in for your own personal benefit. Love it.
I enjoyed listening to him sharing his skills and the visuals made sense with the way he was explaining them. I can imagine however that a good chunk of the processes is something that is a lot more complicated to do than he's making it sound.
Just listening to him so eloquently explain something so malicious you can exploit makes one really consider the security measures they are implementing in their day to day activities via the internet and social media.