Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests
-
0:12 - 0:16So this is a hotel room,
kind of like the one I'm staying in. -
0:16 - 0:18I get board sometimes.
-
0:18 - 0:21A room like this has not a lot
to offer for entertainment. -
0:21 - 0:26But for a hacker, it gets a little
interesting because that television -
0:26 - 0:28is not like the television in your home,
-
0:28 - 0:31it's a node on a network. Right?
-
0:31 - 0:33That means I can mess with it.
-
0:33 - 0:38If I plug a little device
like this into my computer, -
0:38 - 0:40it's an infrared transceiver,
I can send the codes that -
0:40 - 0:44the TV remote might send
and some other codes. -
0:44 - 0:47So what?
Well, I can watch movies for free. -
0:47 - 0:49(Laughter)
-
0:49 - 0:54That doesn't matter to me so much,
but I can play video games too. -
0:55 - 0:58Hey, but what's this?
-
0:58 - 1:01I can not only do this
for my TV in my hotel room, -
1:01 - 1:04I can control your TV
in your hotel room. -
1:04 - 1:05(Laughter)
-
1:05 - 1:08So I can watch you if you're
checking out with one of these, -
1:08 - 1:11you know, TV based registration things,
-
1:11 - 1:14if you're surfing
the web on your hotel TV, -
1:14 - 1:16I can watch you do it.
-
1:17 - 1:20Sometimes it's interesting stuff.
-
1:20 - 1:22Funds transfer.
-
1:23 - 1:26Really big funds transfers.
-
1:26 - 1:28You never know what people
might want to do -
1:28 - 1:32while they're surfing the web
from their hotel room. -
1:32 - 1:35(Laughter)
-
1:35 - 1:38The point is I get to decide
if you're watching Disney or porn tonight. -
1:38 - 1:40Anybody else staying
at the Affinia hotel? -
1:40 - 1:43(Laughter)
-
1:43 - 1:47This is a project I worked on
when we were trying to figure out -
1:47 - 1:50the security properties of wireless
networks; it's called the "Hackerbot". -
1:50 - 1:54This is a robot we've built that can
drive around and find Wi-Fi users, -
1:54 - 1:57drive up to them and show them
their passwords on the screen. -
1:57 - 2:01(Laughter)
-
2:01 - 2:03We just wanted to build a robot,
-
2:03 - 2:05but we didn't know what to make it do, so --
-
2:05 - 2:07We made the pistol
version of the same thing. -
2:07 - 2:09This is called the "Sniper Yagi".
-
2:09 - 2:12It's for your long-range
password sniffing action, -
2:12 - 2:15about a mile away I can watch
your wireless network. -
2:15 - 2:19This is a project I worked on with
Ben Laurie to show passive surveillance. -
2:19 - 2:22So what it is, is a map
of the conference called -
2:22 - 2:24"Computers, Freedom and Privacy".
-
2:24 - 2:29And this conference was in a
hotel, and what we did is we, -
2:29 - 2:31you know, put a computer in
each room of the conference -
2:31 - 2:33that logged all the Bluetooth traffic.
-
2:33 - 2:36So as everybody came and went
with their phones and laptops -
2:36 - 2:39we were able to just
log that, correlate it, -
2:39 - 2:42and then I can print out a map like this
for everybody at the conference. -
2:42 - 2:46This is Kim Cameron,
the Chief Privacy Architect at Microsoft. -
2:46 - 2:46(Laughter)
-
2:46 - 2:49Unbeknownst to him,
-
2:49 - 2:53I got to see everywhere he went.
-
2:53 - 2:56And I can correlate this
and show who he hangs out with -
2:56 - 2:58(phone dialing)
when he got board, -
2:58 - 3:01(phone dialing)
hangs out in the lobby with somebody. -
3:01 - 3:03Anybody here use cellphones?
-
3:03 - 3:05(Laughter)
-
3:05 - 3:08(Phone ringing)
-
3:08 - 3:12So my phone is calling--
-
3:12 - 3:16(Ringing)
-
3:17 - 3:19calling --
-
3:24 - 3:26Voice mail: You have 100 messages.
-
3:26 - 3:28Palbos Holman: Uh oh!
-
3:28 - 3:30VM: First unheard message --
-
3:30 - 3:31PH: Where do I press --
-
3:31 - 3:33VM: Message skipped.
First skipped message. -
3:33 - 3:35PH: Uh oh!
-
3:35 - 3:38VM: Main menu. To listen to your--
You have pressed an incorrect key -- -
3:38 - 3:41You have two skipped messages.
Three saved messages. -
3:41 - 3:43Goodbye.
-
3:43 - 3:46PH: Uh oh!
So we're in Brad's voice mail. -
3:47 - 3:48(Laughter)
-
3:48 - 3:50And I was going to record him
a new message, -
3:50 - 3:53but I seem to have pressed an invalid key,
-
3:53 - 3:54so we're going to move on.
-
3:54 - 3:58And I'll explain how that works some
other day because we're short on time. -
3:58 - 4:00Anybody here used MySpace?
-
4:00 - 4:02MySpace users? Oh!
-
4:02 - 4:05Used to be popular.
It's kind of like Facebook. -
4:05 - 4:09This guy, a buddy of ours Samy,
was trying to meet chicks on MySpace -
4:09 - 4:11which I think is what
it used to be good for. -
4:11 - 4:16And what he did is he had
a page on MySpace about him. -
4:17 - 4:19It lists all your friends,
and that's how you know -
4:19 - 4:22somebody's cool is that they have
a lot of friends on MySpace. -
4:22 - 4:24Well, Samy didn't have any friends.
-
4:24 - 4:28He wrote a little bit of Javascript code
that he put in his page, -
4:28 - 4:30so that whenever you look at his page
-
4:30 - 4:32it would just automagically
add you as his friend. -
4:32 - 4:35And it would skip the whole
acknowledgement response protocol -
4:35 - 4:38saying "Is Samy really your friend?"
-
4:38 - 4:41But then it would copy
that code onto your page, -
4:41 - 4:43so that whenever anybody
looked at your page -
4:43 - 4:46it would automatically add them
as Samy's friend too. -
4:46 - 4:47(Laughter)
-
4:47 - 4:51And it would change your page
to say that "Samy is your hero." -
4:51 - 4:52(Laughter)
-
4:52 - 4:56So in under 24 hours, Samy had
over a million friends on MySpace. -
4:56 - 4:59(Laughter)
-
4:59 - 5:03Hey, he just finished serving
3-years probation for that. -
5:04 - 5:06(Laughter)
-
5:06 - 5:10Even better, Christopher Abad,
this guy, another hacker, -
5:10 - 5:13also trying to meet chicks on
MySpace but having spotty results. -
5:13 - 5:16Some of these dates
didn't work out so well, -
5:16 - 5:20so what Abad did is
he wrote a little bit of code -
5:20 - 5:26to connect MySpace to Spam Assassin,
which is an open source spam filter. -
5:26 - 5:28It works just like
the spam filter in your email. -
5:28 - 5:30You train it by giving it some spam
-
5:30 - 5:33train it by giving it a little
bit of legitimate email, -
5:33 - 5:35and it tries to use
artificial intelligence -
5:35 - 5:37to work out the difference. Right?
-
5:37 - 5:41Well, he just trained it on profiles
from girls he dated and liked -
5:41 - 5:43as legitimate email.
-
5:43 - 5:47Profiles from girls he dated
and not liked, as spam, -
5:47 - 5:50and then ran it against
every profile on MySpace. -
5:50 - 5:53(Laughter)
-
5:53 - 5:56Out spits girls you might like to date.
-
5:56 - 5:59What I say about Abad is, I think,
there's like three startups here. -
5:59 - 6:01I don't know why we need Match.com,
-
6:01 - 6:05when we can have Spam dating?
You know this is innovation. -
6:05 - 6:07He's got a problem, he found a solution.
-
6:07 - 6:12Does anybody use these -- bleep --
keys for opening your car remotely? -
6:12 - 6:16They're popular in, well,
maybe not Chicago, OK. -
6:17 - 6:20So kids these days will drive
through a Wal-Mart parking lot -
6:20 - 6:22clicking open, open, open, bloop.
-
6:22 - 6:26Eventually you find another
Jetta or whatever just like yours, -
6:26 - 6:30maybe a different color,
that uses the same key code. -
6:30 - 6:32Kids will just loot it, lock it up and go.
-
6:32 - 6:34Your insurance company
will roll over on you -
6:34 - 6:36because there's not
evidence of a break-in. -
6:36 - 6:40For one manufacturer we figured
out how to manipulate that key -
6:40 - 6:43so that it will open every car
from that manufacturer. -
6:43 - 6:45(Laughter)
-
6:45 - 6:48There is a point to be made about this
which I barely have time for, -
6:48 - 6:52but it's that your car is now a PC,
your phone is also a PC, -
6:52 - 6:56your toaster, if it is not a PC,
soon will be. Right? -
6:56 - 6:58And I'm not joking about that.
-
6:58 - 7:00And the point of that is
that when that happens -
7:00 - 7:04you inherit all the security
properties and problems of PC's. -
7:04 - 7:06And we have a lot of them.
-
7:06 - 7:09So keep that in mind,
we can talk more about that later. -
7:09 - 7:13Anybody use a lock like this
on your front door? -
7:13 - 7:15OK, good.
-
7:15 - 7:16I do too.
-
7:16 - 7:20This is a Schlage lock.
It's on half of the front doors in America. -
7:20 - 7:23I brought one to show you.
-
7:23 - 7:25So this is my Schlage lock.
-
7:25 - 7:30This is a key that fits the lock,
but isn't cut right, so it won't turn it. -
7:30 - 7:35Anybody here ever tried
to pick locks with tools like this? -
7:35 - 7:39All right, got a few,
few nefarious lock pickers. -
7:40 - 7:42Well, it's for kids with OCD.
-
7:42 - 7:45You've got to put them in there,
and finick with them, -
7:45 - 7:48spend hours getting the finesse
down to manipulate the pins. -
7:48 - 7:51You know, for the ADD kids in the house
there's an easier way. -
7:51 - 7:53I put my little magic key in here,
-
7:53 - 7:56I put a little pressure on there to turn it,
(Tapping) -
7:56 - 7:59smack it a few times
with this special mallet -
7:59 - 8:02and I just picked the lock. We're in.
-
8:03 - 8:05It's easy.
-
8:05 - 8:08And in fact, I don't really know
much more about this than you do. -
8:08 - 8:10It's really, really easy.
-
8:10 - 8:12I have a keychain I made
of the same kind of key -
8:12 - 8:15for every other lock in America.
-
8:15 - 8:19And if you're interested,
I bought a key machine -
8:19 - 8:22so that I can cut these keys
and I made some for all of you guys. -
8:22 - 8:24(Laughter)
-
8:24 - 8:26(Applause)
-
8:26 - 8:28So my gift to you,
come afterwards and I will show you -
8:28 - 8:31how to pick a lock and
give you one of these keys -
8:31 - 8:33you can take home and try it on your door.
-
8:33 - 8:36Anybody used these USB thumb drives?
-
8:36 - 8:39Yeah, print my Word document, yeah!
-
8:39 - 8:43They're very popular.
-
8:43 - 8:46Mine works kind of like yours.
You can print my Word document for me. -
8:46 - 8:50But while you're doing that,
invisibly and magically in the background -
8:50 - 8:54it's just making a handy backup
of your My Documents folder, -
8:54 - 8:58and your browser history and cookies
and your registry and password database, -
8:58 - 9:02and all the things that you might need
someday if you have a problem. -
9:02 - 9:06So we just like to make these things
and litter them around at conferences. -
9:06 - 9:10(Laughter)
-
9:10 - 9:12Anybody here use credit cards?
-
9:12 - 9:13(Laughter)
-
9:13 - 9:14Oh, good!
-
9:14 - 9:18Yeah, so they're popular
and wildly secure. -
9:18 - 9:19(Laughter)
-
9:19 - 9:22Well, there's new credit cards
that you might have gotten in the mail -
9:22 - 9:25with a letter explaining how
it's your new "Secure credit card". -
9:25 - 9:27Anybody get one of these?
-
9:27 - 9:32You know it's secure because
it has a chip in it, an RFID tag, -
9:32 - 9:35and you can use these in
Taxicabs and at Starbucks, -
9:35 - 9:38I brought one to show you,
by just touching the reader. -
9:38 - 9:40Has anybody seen these before?
-
9:40 - 9:42Okay, who's got one?
-
9:44 - 9:46Bring it on up here.
-
9:46 - 9:48(Laughter)
-
9:48 - 9:51There's a prize in it for you.
-
9:51 - 9:54I just want to show you
some things we learned about them. -
9:54 - 9:56I got this credit card in the mail.
-
9:56 - 9:58I really do need some volunteers,
in fact, I need -
9:58 - 10:01one, two, three, four, five
volunteers because the winners -
10:01 - 10:04are going to get these
awesome stainless steel wallets -
10:04 - 10:08that protect you against the problem that
you guessed, I'm about to demonstrate. -
10:08 - 10:11Bring your credit card up here
and I'll show you. -
10:11 - 10:14I want to try it on one of these
awesome new credit cards. -
10:14 - 10:16OK.
-
10:19 - 10:21Do we have a conference organizer,
-
10:21 - 10:24somebody who can coerce people
into cooperating? -
10:24 - 10:25(Laughing)
-
10:25 - 10:29It's by your own volition because --
-
10:30 - 10:33This is where the demo gets really awesome
-
10:33 - 10:34I know you guys have never seen --
-
10:34 - 10:36(Inaudible question)
-
10:36 - 10:37What's that?
-
10:37 - 10:41They're really cool wallets
made of stainless steel. -
10:41 - 10:45Anybody else seen code
on screen at TED before? -
10:45 - 10:47Yeah, this is pretty awesome.
-
10:47 - 10:50(Laughter)
-
10:52 - 10:53OK, great I got volunteers.
-
10:53 - 10:57So who has one of these
exciting credit cards? -
10:58 - 10:59OK, here we go.
-
10:59 - 11:02I'm about to share
your credit card number -
11:02 - 11:04only to 350 close friends.
-
11:04 - 11:06Hear the beep?
-
11:06 - 11:09That means someone's hacking
your credit card. -
11:09 - 11:10OK, what did we get?
-
11:10 - 11:15Valued customer and the credit
card number and expiration date. -
11:15 - 11:19It turns out your secure new
credit card is not totally secure. -
11:19 - 11:22Anybody else want to try yours
while you're here? -
11:22 - 11:24Man: Can you install overdraft protection?
-
11:24 - 11:26PH: Beep, let's see what we got?
-
11:26 - 11:29So we bitched about
this and AMEX changed it, -
11:29 - 11:31so it doesn't show the name anymore.
-
11:31 - 11:35Which is progress.
You can see mine, if it shows it. -
11:37 - 11:41Yeah, it shows my name on it,
that's what my Mom calls me anyway. -
11:41 - 11:43Yours doesn't have it.
-
11:44 - 11:49Anyway, so next time you get
something in the mail -
11:49 - 11:52that says it's secure, send it to me.
-
11:52 - 11:55(Laughter)
-
11:56 - 11:59Oh wait, one of these is empty, hold on.
-
12:01 - 12:03I think this is the one, yep, here you go.
-
12:03 - 12:05You get the one that's disassembled.
-
12:05 - 12:07All right, cool.
-
12:07 - 12:10(Applause)
-
12:10 - 12:14I still have a few minutes yet left,
so I'm going to make a couple of points. -
12:14 - 12:15(Laughter)
-
12:15 - 12:17Oh, shit.
-
12:17 - 12:21That's my subliminal messaging campaign.
It was supposed to be much faster. -
12:21 - 12:25Here's the most exciting
slide ever shown at TED. -
12:25 - 12:28This is the protocol diagram for SSL,
-
12:28 - 12:30which is the encryption
system in your web browser -
12:30 - 12:33that protects your credit card when you're
sending it to Amazon and so on. -
12:33 - 12:35Very exciting, I know, but the point is
-
12:35 - 12:39hackers will attack every
point in this protocol, right? -
12:39 - 12:43I'm going to send two responses
when the server's expecting one. -
12:43 - 12:46I'm going to send a zero
when it's expecting a one. -
12:46 - 12:49I'm going to send twice as much
data as it's expecting. -
12:49 - 12:51I'm going to take twice as long
answering as it's expecting. -
12:51 - 12:54Just try a bunch of stuff.
See where it breaks. -
12:54 - 12:56See what falls in my lap.
-
12:56 - 13:01When I find a hole like that
then I can start looking for an exploit. -
13:01 - 13:06This is a little more what SSL looks
like to hackers, that's really boring. -
13:06 - 13:11This guy kills a million Africans a year.
-
13:11 - 13:15It's Anopheles stephensi mosquito
carrying malaria. -
13:16 - 13:18Is this the wrong talk?
-
13:18 - 13:19(Laughter)
-
13:19 - 13:23This is a protocol diagram for malaria.
-
13:24 - 13:27So what we're doing in our lab
is attacking this protocol -
13:27 - 13:30at every point we can find.
-
13:30 - 13:33It has a very complex life cycle
that I won't go into now, -
13:33 - 13:36but it spends some time in humans,
some time in mosquitos -
13:36 - 13:39and what I need are hackers.
-
13:39 - 13:44Because hackers have a mind
that's optimized for discovery. -
13:44 - 13:47They have a mind that's optimized
for figuring out what's possible. -
13:47 - 13:50You know, I often illustrate this
by saying, -
13:50 - 13:55If you get some random new
gadget and show it to your Mom, -
13:55 - 13:59she might say, "Well, what does this do?"
And you'd say "Mom, it's a phone." -
13:59 - 14:03And instantly, she'd would know
exactly what it's for. -
14:03 - 14:05But with a hacker,
the question is different. -
14:05 - 14:09The question is
"What can I make this do?" -
14:09 - 14:12I'm going to take all the screws out,
and take the back off, -
14:12 - 14:14and break it into a lot of little pieces.
-
14:14 - 14:17But then I'm going to figure out
what I can build from the rubble. -
14:17 - 14:21That's discovery, and we need to
do that in science and technology -
14:21 - 14:23to figure out what's possible.
-
14:23 - 14:27And so in the lab what I'm trying
to do is apply that mindset -
14:27 - 14:30to some of the biggest
problems humans have. -
14:30 - 14:34We work on malaria, thanks to
Bill Gates, who asked us to work on it. -
14:34 - 14:37This is how we used to solve malaria.
-
14:37 - 14:39This is a real ad from like the 40's.
-
14:39 - 14:43We eradicated malaria in the US
by spraying DDT everywhere. -
14:44 - 14:49In the lab what we do is a lot of work
to try and understand the problem. -
14:49 - 14:54This is a high-speed video,
we have a badass video camera, -
14:54 - 14:56trying to learn how mosquitos fly.
-
14:56 - 14:59And you can see that
they're more like swimming in air. -
14:59 - 15:01We actually have no idea how they fly.
-
15:01 - 15:04But we have a cool video camera so we --
-
15:04 - 15:06(Laughter)
-
15:06 - 15:09Yeah, it cost more than a Ferrari.
-
15:09 - 15:12Anyway we came up with some
ways to take care of mosquitos. -
15:12 - 15:15Let's shoot them down with laser beams.
-
15:15 - 15:19This is what happens when you put
one of every kind of scientist in a room -
15:19 - 15:21and a laser junky.
-
15:21 - 15:25So people thought it was funny at first,
-
15:25 - 15:30but we figured out, you know, we can
build this out of consumer electronics. -
15:30 - 15:33It's using the CCD from a webcam,
-
15:33 - 15:37the laser from a Blu-ray burner,
-
15:37 - 15:40the laser galvo is from a laser printer.
-
15:40 - 15:43We do motion detection on a GPU processor
-
15:43 - 15:45like you might find in video game system.
-
15:45 - 15:47It's all stuff that follows Moore's law.
-
15:47 - 15:50So it's actually not going to
be that expensive to do it. -
15:50 - 15:52The idea is that we would put
-
15:52 - 15:56a perimeter of these laser systems
around a building or a village -
15:56 - 16:00and just shoot all the mosquitos
on their way in to feed on humans. -
16:00 - 16:03And we might want to do that
for your backyard. -
16:03 - 16:05We could also do it to protect crops.
-
16:05 - 16:07Our team is right now working on
-
16:07 - 16:09characterizing what they
need to do the same thing for -
16:09 - 16:13the pest that has wiped out
about two thirds -
16:13 - 16:16of the Orange groves in Florida.
-
16:18 - 16:21So people laughed at first.
-
16:21 - 16:23This is a video of our system working.
-
16:23 - 16:26We are tracking mosquitos live
as they fly around. -
16:26 - 16:29Those crosshairs are put there
by our computer. -
16:29 - 16:30It just watches them,
finds them moving -
16:30 - 16:34and then it aims a laser at them
to sample their wing beat frequency. -
16:34 - 16:37Figure out from that,
is this a mosquito? -
16:37 - 16:40Is it Anopheles Stephensi?
Is it female? -
16:40 - 16:45And if all that's true then
we shoot it down with lethal laser. -
16:45 - 16:47(Laughter)
-
16:47 - 16:49So we have this working in a lab.
-
16:49 - 16:52We're working on taking
that project into the field now. -
16:52 - 16:56All this happens at the Intellectual
Ventures Lab in Seattle where I work -
16:56 - 17:02and we try and take on some
of the hardest problems that humans have. -
17:02 - 17:03This is the money shot.
-
17:03 - 17:07You can see we just burned
his wing off with a UV laser. -
17:07 - 17:09He's not coming back.
-
17:09 - 17:12(Applause)
-
17:12 - 17:16Kind of vaporized
his wing right there, yeah. -
17:16 - 17:19They love it.
I mean, you know. -
17:19 - 17:21Never got called by PETA or anyone else.
-
17:21 - 17:23I mean, it's the perfect enemy.
-
17:23 - 17:26There's just no one coming
to the rescue of mosquitos. -
17:26 - 17:30Sometimes we overdo it.
-
17:30 - 17:32So anyway, I'm going to get off stage.
-
17:32 - 17:35This is the Intellectual Ventures Lab
where I work. -
17:35 - 17:38Basically we use every kind of scientist
-
17:38 - 17:42and one of every tool in the world
to work on crazy invention projects. -
17:42 - 17:44Thanks.
-
17:44 - 17:45(Applause)
- Title:
- Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests
- Description:
-
You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and "secure" credit cards, Hacker extraordinaire shows how nearly every secure system is vulnerable.
- Video Language:
- English
- Team:
- closed TED
- Project:
- TEDxTalks
- Duration:
- 17:51
TED Translators admin edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | ||
Ivana Korom approved English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | ||
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | ||
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | ||
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | ||
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | ||
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | ||
Ariana Bleau Lugo accepted English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests |