Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests
-
0:12 - 0:16So this is a hotel room,
kind of like the one I'm staying in. -
0:16 - 0:18I get board sometimes.
-
0:18 - 0:21A room like this has not a lot
to offer for entertainment. -
0:21 - 0:26But for a hacker, it gets a little
interesting because that television -
0:26 - 0:28is not like the television in your home,
-
0:28 - 0:31it's a node on a network. Right?
-
0:31 - 0:33That means I can mess with it.
-
0:33 - 0:38If I plug a little device
like this into my computer, -
0:38 - 0:40it's an infrared transceiver,
I can send the codes that -
0:40 - 0:44the TV remote might send
and some other codes. -
0:44 - 0:47So what?
Well, I can watch movies for free. -
0:47 - 0:49(Laughter)
-
0:49 - 0:54That doesn't matter to me so much,
but I can play video games too. -
0:55 - 0:58Hey, but what's this?
-
0:58 - 1:01I can not only do this
for my TV in my hotel room, -
1:01 - 1:04I can control your TV
in your hotel room. -
1:04 - 1:05(Laughter)
-
1:05 - 1:08So I can watch you if you're
checking out with one of these, -
1:08 - 1:11you know, TV based registration things,
-
1:11 - 1:14if you're surfing
the web on your hotel TV, -
1:14 - 1:16I can watch you do it.
-
1:17 - 1:20Sometimes it's interesting stuff.
-
1:20 - 1:22Funds transfer.
-
1:23 - 1:26Really big funds transfers.
-
1:26 - 1:28You never know what people
might want to do -
1:28 - 1:32while they're surfing the web
from their hotel room. -
1:32 - 1:35(Laughter)
-
1:35 - 1:38The point is I get to decide
if you're watching Disney or porn tonight. -
1:38 - 1:40Anybody else staying
at the Affinia hotel? -
1:40 - 1:43(Laughter)
-
1:43 - 1:47This is a project I worked on
when we were trying to figure out -
1:47 - 1:50the security properties of wireless
networks; it's called the "Hackerbot". -
1:50 - 1:54This is a robot we've built that can
drive around and find Wi-Fi users, -
1:54 - 1:57drive up to them and show them
their passwords on the screen. -
1:57 - 2:01(Laughter)
-
2:01 - 2:03We just wanted to build a robot,
-
2:03 - 2:05but we didn't know what to make it do, so --
-
2:05 - 2:07We made the pistol
version of the same thing. -
2:07 - 2:09This is called the "Sniper Yagi".
-
2:09 - 2:12It's for your long-range
password sniffing action, -
2:12 - 2:15about a mile away I can watch
your wireless network. -
2:15 - 2:19This is a project I worked on with
Ben Laurie to show passive surveillance. -
2:19 - 2:22So what it is, is a map
of the conference called -
2:22 - 2:24"Computers, Freedom and Privacy".
-
2:24 - 2:29And this conference was in a
hotel, and what we did is we, -
2:29 - 2:31you know, put a computer in
each room of the conference -
2:31 - 2:33that logged all the Bluetooth traffic.
-
2:33 - 2:36So as everybody came and went
with their phones and laptops -
2:36 - 2:39we were able to just
log that, correlate it, -
2:39 - 2:42and then I can print out a map like this
for everybody at the conference. -
2:42 - 2:46This is Kim Cameron,
the Chief Privacy Architect at Microsoft. -
2:46 - 2:46(Laughter)
-
2:46 - 2:49Unbeknownst to him,
-
2:49 - 2:53I got to see everywhere he went.
-
2:53 - 2:56And I can correlate this
and show who he hangs out with -
2:56 - 2:58(phone dialing)
when he got board, -
2:58 - 3:01(phone dialing)
hangs out in the lobby with somebody. -
3:01 - 3:03Anybody here use cellphones?
-
3:03 - 3:05(Laughter)
-
3:05 - 3:08(Phone ringing)
-
3:08 - 3:12So my phone is calling--
-
3:12 - 3:16(Ringing)
-
3:17 - 3:19calling --
-
3:24 - 3:26Voice mail: You have 100 messages.
-
3:26 - 3:28Palbos Holman: Uh oh!
-
3:28 - 3:30VM: First unheard message --
-
3:30 - 3:31PH: Where do I press --
-
3:31 - 3:33VM: Message skipped.
First skipped message. -
3:33 - 3:35PH: Uh oh!
-
3:35 - 3:38VM: Main menu. To listen to your--
You have pressed an incorrect key -- -
3:38 - 3:41You have two skipped messages.
Three saved messages. -
3:41 - 3:43Goodbye.
-
3:43 - 3:46PH: Uh oh!
So we're in Brad's voice mail. -
3:47 - 3:48(Laughter)
-
3:48 - 3:50And I was going to record him
a new message, -
3:50 - 3:53but I seem to have pressed an invalid key,
-
3:53 - 3:54so we're going to move on.
-
3:54 - 3:58And I'll explain how that works some
other day because we're short on time. -
3:58 - 4:00Anybody here used MySpace?
-
4:00 - 4:02MySpace users? Oh!
-
4:02 - 4:05Used to be popular.
It's kind of like Facebook. -
4:05 - 4:09This guy, a buddy of ours Samy,
was trying to meet chicks on MySpace -
4:09 - 4:11which I think is what
it used to be good for. -
4:11 - 4:16And what he did is he had
a page on MySpace about him. -
4:17 - 4:19It lists all your friends,
and that's how you know -
4:19 - 4:22somebody's cool is that they have
a lot of friends on MySpace. -
4:22 - 4:24Well, Samy didn't have any friends.
-
4:24 - 4:28He wrote a little bit of Javascript code
that he put in his page, -
4:28 - 4:30so that whenever you look at his page
-
4:30 - 4:32it would just automagically
add you as his friend. -
4:32 - 4:35And it would skip the whole
acknowledgement response protocol -
4:35 - 4:38saying "Is Samy really your friend?"
-
4:38 - 4:41But then it would copy
that code onto your page, -
4:41 - 4:43so that whenever anybody
looked at your page -
4:43 - 4:46it would automatically add them
as Samy's friend too. -
4:46 - 4:47(Laughter)
-
4:47 - 4:51And it would change your page
to say that "Samy is your hero." -
4:51 - 4:52(Laughter)
-
4:52 - 4:56So in under 24 hours, Samy had
over a million friends on MySpace. -
4:56 - 4:59(Laughter)
-
4:59 - 5:03Hey, he just finished serving
3-years probation for that. -
5:04 - 5:06(Laughter)
-
5:06 - 5:10Even better, Christopher Abad,
this guy, another hacker, -
5:10 - 5:13also trying to meet chicks on
MySpace but having spotty results. -
5:13 - 5:16Some of these dates
didn't work out so well, -
5:16 - 5:20so what Abad did is
he wrote a little bit of code -
5:20 - 5:26to connect MySpace to Spam Assassin,
which is an open source spam filter. -
5:26 - 5:28It works just like
the spam filter in your email. -
5:28 - 5:30You train it by giving it some spam
-
5:30 - 5:33train it by giving it a little
bit of legitimate email, -
5:33 - 5:35and it tries to use
artificial intelligence -
5:35 - 5:37to work out the difference. Right?
-
5:37 - 5:41Well, he just trained it on profiles
from girls he dated and liked -
5:41 - 5:43as legitimate email.
-
5:43 - 5:47Profiles from girls he dated
and not liked, as spam, -
5:47 - 5:50and then ran it against
every profile on MySpace. -
5:50 - 5:53(Laughter)
-
5:53 - 5:56Out spits girls you might like to date.
-
5:56 - 5:59What I say about Abad is, I think,
there's like three startups here. -
5:59 - 6:01I don't know why we need Match.com,
-
6:01 - 6:05when we can have Spam dating?
You know this is innovation. -
6:05 - 6:07He's got a problem, he found a solution.
-
6:07 - 6:12Does anybody use these -- bleep --
keys for opening your car remotely? -
6:12 - 6:16They're popular in, well,
maybe not Chicago, OK. -
6:17 - 6:20So kids these days will drive
through a Wal-Mart parking lot -
6:20 - 6:22clicking open, open, open, bloop.
-
6:22 - 6:26Eventually you find another
Jetta or whatever just like yours, -
6:26 - 6:30maybe a different color,
that uses the same key code. -
6:30 - 6:32Kids will just loot it, lock it up and go.
-
6:32 - 6:34Your insurance company
will roll over on you -
6:34 - 6:36because there's not
evidence of a break-in. -
6:36 - 6:40For one manufacturer we figured
out how to manipulate that key -
6:40 - 6:43so that it will open every car
from that manufacturer. -
6:43 - 6:45(Laughter)
-
6:45 - 6:48There is a point to be made about this
which I barely have time for, -
6:48 - 6:52but it's that your car is now a PC,
your phone is also a PC, -
6:52 - 6:56your toaster, if it is not a PC,
soon will be. Right? -
6:56 - 6:58And I'm not joking about that.
-
6:58 - 7:00And the point of that is
that when that happens -
7:00 - 7:04you inherit all the security
properties and problems of PC's. -
7:04 - 7:06And we have a lot of them.
-
7:06 - 7:09So keep that in mind,
we can talk more about that later. -
7:09 - 7:13Anybody use a lock like this
on your front door? -
7:13 - 7:15OK, good.
-
7:15 - 7:16I do too.
-
7:16 - 7:20This is a Schlage lock.
It's on half of the front doors in America. -
7:20 - 7:23I brought one to show you.
-
7:23 - 7:25So this is my Schlage lock.
-
7:25 - 7:30This is a key that fits the lock,
but isn't cut right, so it won't turn it. -
7:30 - 7:35Anybody here ever tried
to pick locks with tools like this? -
7:35 - 7:39All right, got a few,
few nefarious lock pickers. -
7:40 - 7:42Well, it's for kids with OCD.
-
7:42 - 7:45You've got to put them in there,
and finick with them, -
7:45 - 7:48spend hours getting the finesse
down to manipulate the pins. -
7:48 - 7:51You know, for the ADD kids in the house
there's an easier way. -
7:51 - 7:53I put my little magic key in here,
-
7:53 - 7:56I put a little pressure on there to turn it,
(Tapping) -
7:56 - 7:59smack it a few times
with this special mallet -
7:59 - 8:02and I just picked the lock. We're in.
-
8:03 - 8:05It's easy.
-
8:05 - 8:08And in fact, I don't really know
much more about this than you do. -
8:08 - 8:10It's really, really easy.
-
8:10 - 8:12I have a keychain I made
of the same kind of key -
8:12 - 8:15for every other lock in America.
-
8:15 - 8:19And if you're interested,
I bought a key machine -
8:19 - 8:22so that I can cut these keys
and I made some for all of you guys. -
8:22 - 8:24(Laughter)
-
8:24 - 8:26(Applause)
-
8:26 - 8:28So my gift to you,
come afterwards and I will show you -
8:28 - 8:31how to pick a lock and
give you one of these keys -
8:31 - 8:33you can take home and try it on your door.
-
8:33 - 8:36Anybody used these USB thumb drives?
-
8:36 - 8:39Yeah, print my Word document, yeah!
-
8:39 - 8:43They're very popular.
-
8:43 - 8:46Mine works kind of like yours.
You can print my Word document for me. -
8:46 - 8:50But while you're doing that,
invisibly and magically in the background -
8:50 - 8:54it's just making a handy backup
of your My Documents folder, -
8:54 - 8:58and your browser history and cookies
and your registry and password database, -
8:58 - 9:02and all the things that you might need
someday if you have a problem. -
9:02 - 9:06So we just like to make these things
and litter them around at conferences. -
9:06 - 9:10(Laughter)
-
9:10 - 9:12Anybody here use credit cards?
-
9:12 - 9:13(Laughter)
-
9:13 - 9:14Oh, good!
-
9:14 - 9:18Yeah, so they're popular
and wildly secure. -
9:18 - 9:19(Laughter)
-
9:19 - 9:22Well, there's new credit cards
that you might have gotten in the mail -
9:22 - 9:25with a letter explaining how
it's your new "Secure credit card". -
9:25 - 9:27Anybody get one of these?
-
9:27 - 9:32You know it's secure because
it has a chip in it, an RFID tag, -
9:32 - 9:35and you can use these in
Taxicabs and at Starbucks, -
9:35 - 9:38I brought one to show you,
by just touching the reader. -
9:38 - 9:40Has anybody seen these before?
-
9:40 - 9:42Okay, who's got one?
-
9:44 - 9:46Bring it on up here.
-
9:46 - 9:48(Laughter)
-
9:48 - 9:51There's a prize in it for you.
-
9:51 - 9:54I just want to show you
some things we learned about them. -
9:54 - 9:56I got this credit card in the mail.
-
9:56 - 9:58I really do need some volunteers,
in fact, I need -
9:58 - 10:01one, two, three, four, five
volunteers because the winners -
10:01 - 10:04are going to get these
awesome stainless steel wallets -
10:04 - 10:08that protect you against the problem that
you guessed, I'm about to demonstrate. -
10:08 - 10:11Bring your credit card up here
and I'll show you. -
10:11 - 10:14I want to try it on one of these
awesome new credit cards. -
10:14 - 10:16OK.
-
10:19 - 10:21Do we have a conference organizer,
-
10:21 - 10:24somebody who can coerce people
into cooperating? -
10:24 - 10:25(Laughing)
-
10:25 - 10:29It's by your own volition because --
-
10:30 - 10:33This is where the demo gets really awesome
-
10:33 - 10:34I know you guys have never seen --
-
10:34 - 10:36(Inaudible question)
-
10:36 - 10:37What's that?
-
10:37 - 10:41They're really cool wallets
made of stainless steel. -
10:41 - 10:45Anybody else seen code
on screen at TED before? -
10:45 - 10:47Yeah, this is pretty awesome.
-
10:47 - 10:50(Laughter)
-
10:52 - 10:53OK, great I got volunteers.
-
10:53 - 10:57So who has one of these
exciting credit cards? -
10:58 - 10:59OK, here we go.
-
10:59 - 11:02I'm about to share
your credit card number -
11:02 - 11:04only to 350 close friends.
-
11:04 - 11:06Hear the beep?
-
11:06 - 11:09That means someone's hacking
your credit card. -
11:09 - 11:10OK, what did we get?
-
11:10 - 11:15Valued customer and the credit
card number and expiration date. -
11:15 - 11:19It turns out your secure new
credit card is not totally secure. -
11:19 - 11:22Anybody else want to try yours
while you're here? -
11:22 - 11:24Man: Can you install overdraft protection?
-
11:24 - 11:26PH: Beep, let's see what we got?
-
11:26 - 11:29So we bitched about
this and AMEX changed it, -
11:29 - 11:31so it doesn't show the name anymore.
-
11:31 - 11:35Which is progress.
You can see mine, if it shows it. -
11:37 - 11:41Yeah, it shows my name on it,
that's what my Mom calls me anyway. -
11:41 - 11:43Yours doesn't have it.
-
11:44 - 11:49Anyway, so next time you get
something in the mail -
11:49 - 11:52that says it's secure, send it to me.
-
11:52 - 11:55(Laughter)
-
11:56 - 11:59Oh wait, one of these is empty, hold on.
-
12:01 - 12:03I think this is the one, yep, here you go.
-
12:03 - 12:05You get the one that's disassembled.
-
12:05 - 12:07All right, cool.
-
12:07 - 12:10(Applause)
-
12:10 - 12:14I still have a few minutes yet left,
so I'm going to make a couple of points. -
12:14 - 12:15(Laughter)
-
12:15 - 12:17Oh, shit.
-
12:17 - 12:21That's my subliminal messaging campaign.
It was supposed to be much faster. -
12:21 - 12:25Here's the most exciting
slide ever shown at TED. -
12:25 - 12:28This is the protocol diagram for SSL,
-
12:28 - 12:30which is the encryption
system in your web browser -
12:30 - 12:33that protects your credit card when you're
sending it to Amazon and so on. -
12:33 - 12:35Very exciting, I know, but the point is
-
12:35 - 12:39hackers will attack every
point in this protocol, right? -
12:39 - 12:43I'm going to send two responses
when the server's expecting one. -
12:43 - 12:46I'm going to send a zero
when it's expecting a one. -
12:46 - 12:49I'm going to send twice as much
data as it's expecting. -
12:49 - 12:51I'm going to take twice as long
answering as it's expecting. -
12:51 - 12:54Just try a bunch of stuff.
See where it breaks. -
12:54 - 12:56See what falls in my lap.
-
12:56 - 13:01When I find a hole like that
then I can start looking for an exploit. -
13:01 - 13:06This is a little more what SSL looks
like to hackers, that's really boring. -
13:06 - 13:11This guy kills a million Africans a year.
-
13:11 - 13:15It's Anopheles stephensi mosquito
carrying malaria. -
13:16 - 13:18Is this the wrong talk?
-
13:18 - 13:19(Laughter)
-
13:19 - 13:23This is a protocol diagram for malaria.
-
13:24 - 13:27So what we're doing in our lab
is attacking this protocol -
13:27 - 13:30at every point we can find.
-
13:30 - 13:33It has a very complex life cycle
that I won't go into now, -
13:33 - 13:36but it spends some time in humans,
some time in mosquitos -
13:36 - 13:39and what I need are hackers.
-
13:39 - 13:44Because hackers have a mind
that's optimized for discovery. -
13:44 - 13:47They have a mind that's optimized
for figuring out what's possible. -
13:47 - 13:50You know, I often illustrate this
by saying, -
13:50 - 13:55If you get some random new
gadget and show it to your Mom, -
13:55 - 13:59she might say, "Well, what does this do?"
And you'd say "Mom, it's a phone." -
13:59 - 14:03And instantly, she'd would know
exactly what it's for. -
14:03 - 14:05But with a hacker,
the question is different. -
14:05 - 14:09The question is
"What can I make this do?" -
14:09 - 14:12I'm going to take all the screws out,
and take the back off, -
14:12 - 14:14and break it into a lot of little pieces.
-
14:14 - 14:17But then I'm going to figure out
what I can build from the rubble. -
14:17 - 14:21That's discovery, and we need to
do that in science and technology -
14:21 - 14:23to figure out what's possible.
-
14:23 - 14:27And so in the lab what I'm trying
to do is apply that mindset -
14:27 - 14:30to some of the biggest
problems humans have. -
14:30 - 14:34We work on malaria, thanks to
Bill Gates, who asked us to work on it. -
14:34 - 14:37This is how we used to solve malaria.
-
14:37 - 14:39This is a real ad from like the 40's.
-
14:39 - 14:43We eradicated malaria in the US
by spraying DDT everywhere. -
14:44 - 14:49In the lab what we do is a lot of work
to try and understand the problem. -
14:49 - 14:54This is a high-speed video,
we have a badass video camera, -
14:54 - 14:56trying to learn how mosquitos fly.
-
14:56 - 14:59And you can see that
they're more like swimming in air. -
14:59 - 15:01We actually have no idea how they fly.
-
15:01 - 15:04But we have a cool video camera so we --
-
15:04 - 15:06(Laughter)
-
15:06 - 15:09Yeah, it cost more than a Ferrari.
-
15:09 - 15:12Anyway we came up with some
ways to take care of mosquitos. -
15:12 - 15:15Let's shoot them down with laser beams.
-
15:15 - 15:19This is what happens when you put
one of every kind of scientist in a room -
15:19 - 15:21and a laser junky.
-
15:21 - 15:25So people thought it was funny at first,
-
15:25 - 15:30but we figured out, you know, we can
build this out of consumer electronics. -
15:30 - 15:33It's using the CCD from a webcam,
-
15:33 - 15:37the laser from a Blu-ray burner,
-
15:37 - 15:40the laser galvo is from a laser printer.
-
15:40 - 15:43We do motion detection on a GPU processor
-
15:43 - 15:45like you might find in video game system.
-
15:45 - 15:47It's all stuff that follows Moore's law.
-
15:47 - 15:50So it's actually not going to
be that expensive to do it. -
15:50 - 15:52The idea is that we would put
-
15:52 - 15:56a perimeter of these laser systems
around a building or a village -
15:56 - 16:00and just shoot all the mosquitos
on their way in to feed on humans. -
16:00 - 16:03And we might want to do that
for your backyard. -
16:03 - 16:05We could also do it to protect crops.
-
16:05 - 16:07Our team is right now working on
-
16:07 - 16:09characterizing what they
need to do the same thing for -
16:09 - 16:13the pest that has wiped out
about two thirds -
16:13 - 16:16of the Orange groves in Florida.
-
16:18 - 16:21So people laughed at first.
-
16:21 - 16:23This is a video of our system working.
-
16:23 - 16:26We are tracking mosquitos live
as they fly around. -
16:26 - 16:29Those crosshairs are put there
by our computer. -
16:29 - 16:30It just watches them,
finds them moving -
16:30 - 16:34and then it aims a laser at them
to sample their wing beat frequency. -
16:34 - 16:37Figure out from that,
is this a mosquito? -
16:37 - 16:40Is it Anopheles Stephensi?
Is it female? -
16:40 - 16:45And if all that's true then
we shoot it down with lethal laser. -
16:45 - 16:47(Laughter)
-
16:47 - 16:49So we have this working in a lab.
-
16:49 - 16:52We're working on taking
that project into the field now. -
16:52 - 16:56All this happens at the Intellectual
Ventures Lab in Seattle where I work -
16:56 - 17:02and we try and take on some
of the hardest problems that humans have. -
17:02 - 17:03This is the money shot.
-
17:03 - 17:07You can see we just burned
his wing off with a UV laser. -
17:07 - 17:09He's not coming back.
-
17:09 - 17:12(Applause)
-
17:12 - 17:16Kind of vaporized
his wing right there, yeah. -
17:16 - 17:19They love it.
I mean, you know. -
17:19 - 17:21Never got called by PETA or anyone else.
-
17:21 - 17:23I mean, it's the perfect enemy.
-
17:23 - 17:26There's just no one coming
to the rescue of mosquitos. -
17:26 - 17:30Sometimes we overdo it.
-
17:30 - 17:32So anyway, I'm going to get off stage.
-
17:32 - 17:35This is the Intellectual Ventures Lab
where I work. -
17:35 - 17:38Basically we use every kind of scientist
-
17:38 - 17:42and one of every tool in the world
to work on crazy invention projects. -
17:42 - 17:44Thanks.
-
17:44 - 17:45(Applause)
- Title:
- Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests
- Description:
-
more » « less
You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and "secure" credit cards, Hacker extraordinaire shows how nearly every secure system is vulnerable.
- Video Language:
- English
- Team:
closed TED
- Project:
- TEDxTalks
- Duration:
- 17:51
| TED Translators admin edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | ||
|
Ivana Korom approved English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | |
|
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | |
|
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | |
|
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | |
|
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | |
|
Ivana Korom edited English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests | |
|
Ariana Bleau Lugo accepted English subtitles for Top Hacker Shows Us How It's Done: Pablos Holman at TEDxMidwests |

