Podcast appearances and mentions of Samy Kamkar

  • 29PODCASTS
  • 30EPISODES
  • 53mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 4, 2024LATEST
Samy Kamkar

POPULARITY

20172018201920202021202220232024


Latest podcast episodes about Samy Kamkar

Jetpack for the Mind
Samy is My Hero — Samy Kamkar

Jetpack for the Mind

Play Episode Listen Later Jan 4, 2024 89:35


Samy Kamkar is a genius hacker. When you guys hear me praising the minds of hackers and how brilliant they are, Samy's on the top of the list.

hero samy samy kamkar pablos holman
Jetpack for the Mind
Samy is My Hero — Samy Kamkar

Jetpack for the Mind

Play Episode Listen Later Jan 4, 2024 90:00


 This is probably the conversation I had in mind when I decided to start this podcast. Samy Kamkar is an old buddy of mine, a genius hacker. When you guys hear me praising the minds of hackers and how brilliant they can be and how they think, Samy is the example in my mind that I'm thinking of, and I always love to share him. Samy's famous for having written a computer virus that he was using to meet girls on the internet, which is probably ill-advised. The virus he wrote took over MySpace. It was incredibly genius! What would happen is: if you looked at Samy's page on MySpace, it would just automatically add you as his friend. MySpace is long gone, but you could imagine what that would be like on Facebook or Instagram or Snapchat nowadays. So, within 24 hour period, Samy had over a million friends on his MySpace profile, because the code not only would add you as his friend, it would copy itself to your page so that whenever anybody looked at your page, it would automatically add them as Samy's friend too, and then do one other benign thing, which would change your profile page to list Samy as your HERO! Samy is my hero. I love him so much. He's done a lot of amazing, beautiful work and computer hacking. He has a YouTube channel that we'll talk about on here, but you should definitely go watch his videos. I'm not going to interview Samy. that has been done and you should listen to the Tim Ferriss interview of Samy. I think of this conversation is something you could listen to with or without having heard that, but if you want to know more about Samy and his background and all the stories, then you can go listen to Tim Ferris interviewing him. This however is a conversation between friends, it is very soulful. There's a lot in here that I'm looking forward to sharing with you guys. Also, Samy is a co-founder of a couple of company that have been very successful and he sold his most recent company called Open Path to Motorola. This is not an ad, I'm just telling you because I'm impressed with what Samy built: Open Path is a physical door access control system that's way better than those cards you used to have to use to get into your office. Now you can just do it with your phone and walk right in. Samy has helped build that product and the company is doing very well. And I think you should all become, customers. Oh, and I almost forgot to tell you Samy, at one point decided he wanted to become a DJ and learn how to make music. And he's the one who created the track that we use for the podcast intro that you're going to hear next. Please listen to this conversation with me and Samy. I'm sure you're going to get a lot out of it. Important Links: Samy is my Hero Samy on Wikipedia Samy's Website Samy on YouTube Tim Ferriss Podcast with Samy About Samy Kamkar Samy Kamkar is an American privacy and security researcher, computer hacker and entrepreneur. At the age of 16, he dropped out of high school.[One year later, he co-founded Fonality, a unified communications company based on open-source software, which raised over $46 million in private funding. In 2005, he created and released the fastest spreading virus of all time, the MySpace worm Samy, and was subsequently raided by the United States Secret Service under the Patriot Act. He also created SkyJack, a custom drone which hacks into any nearby Parrot drones allowing them to be controlled by its operator and created the Evercookie, which appeared in a top-secret NSA document revealed by Edward Snowden and on the front page of The New York Times. He has also worked with The Wall Street Journal, and discovered the illicit mobile phone tracking where the Apple iPhone, Google Android and Microsoft Windows Phone mobile devices transmit GPS and Wi-Fi information to their parent companies. His mobile research led to a series of class-action lawsuits against the companies and a privacy hearing on Capitol Hill.

We Hack Purple Podcast
We Hack Purple Podcast Episode 71 with Ariel Shin

We Hack Purple Podcast

Play Episode Listen Later Apr 18, 2023 33:47


In episode 71 of the We Hack Purple Podcast Host Tanya Janca speaks to the Ariel Shin from Twillio! Ariel does product security, and as you might imagine, Tanya had at least 100 questions for her.  We discussed threat modelling, influence, persuasion and other communication skills needed to be an effective #AppSec person (or any security professional, for that matter). The conversation got really interesting as we dove into how to communicate with an executive, versus an engineer, versus a non-tech person, and how we can communicate and advocate for security (effectively) in the process. She talked about breaking down an argument into multiple pieces, to ensure you get the message across the best possible way. If you are someone who has struggled with convincing the rest of IT to patch or fix bugs, she breaks down how to do this in a way Tanya plans to adopt from now on. Take a listen at the links below!  Ariel's Bio: Ariel Shin is a product security team lead at Twilio. Ariel started her career as a penetration tester, specializing in web and mobile security, before moving into the product security space. Ariel enjoys building relationships with developers through secure code reviews, threat modeling, security training, and vulnerability management. Currently, Ariel is working on rolling out and expanding Self-Service Threat Models for the Twilio Org.  Ariel's Social Media:  linkedin.com/in/arielshin/ Link to the great podcast episode Ariel spoke about: “Hacker Explains One Concept in 5 Levels of Difficulty” by WIRED Podcast, featuring Samy Kamkar.   Very special thanks to our sponsor: Women's Society of Cyberjutsu!  Women's Society of Cyberjutsu are hosting CYBERJUTSU CON 4.0 and the 10th Annual Cyberjutsu Awards on June 24, 2023!!! The Con will consist of Hands-on Workshops, Capture The Flag (CTF) Competitions, Professional Headshots, Recruiting Opportunities, Celebration, and more.  Participants will walk away with hands-on knowledge that can be applied immediately on the job. You can check out the event here: https://womenscyberjutsu.org/page/CyberCon2023 FYI the call for papers is still OPEN! Apply here: https://www.papercall.io/cyberjutsucon2023 And the nominations for the Annual Cyberjutsu Awards are here: https://womenscyberjutsu.org/page/AWARDS2023  Join We Hack Purple!  Check out our brand new courses in We Hack Purple Academy. Join us in the We Hack Purple Community:  A fun and safe place to learn and share your knowledge with other professionals in the field. Subscribe to our newsletter for even more free knowledge! You can find us, in audio format, on Podcast Addict, Apple Podcast, Overcast, Pod, Amazon Music, Spotify, and more!    

The Bootloader
Supersized for Supercon

The Bootloader

Play Episode Listen Later Dec 5, 2022 25:01


Tod shares some of his favorite talks from the recent Supercon conference in Pasadena, CA. Paul and Tod each share one thing they found interesting. Follow Tod on Mastodon: @todbot@mastodon.social Follow Paul on Mastodon: @prcutler@fosstodon.orgShow Notes0:00 Welcome to the Supersize Supercon episode3:17 The Supercon badge8:02 DIY Vacuum Tubes by Nick Pool10:31 Personal Electric Vehicles by Bradley Gawthrop13:00 Samy Kamkar's Random Walk Exploration15:45 How to Hang and Sell Your Blinky Goodness as Art byChris Combs18:15 Back in person19:40 Python in the browser22:00 Tod's PicoStepSeq

Built for Change
The Path to Cyber Resilience

Built for Change

Play Episode Listen Later Jun 1, 2022 27:12 Very Popular


Cyber attacks are on the rise – and companies face a constant battle to stay ahead. In 2021, breaches of data, networks, services and other assets climbed by 31%. In this episode, we'll talk to a former hacker who, years ago, was responsible for one of the fastest-spreading computer viruses in history. We'll also discuss the risks facing organizations that don't prioritize the alignment of cybersecurity best practices with their overall business strategy. Our guests this week are Samy Kamkar, C.S.O. at Openpath, and Jacky Fox, the European Lead for Security at Accenture.

Security Explained
A Journey in Infosec w/ Samy Kamkar

Security Explained

Play Episode Listen Later Feb 2, 2022 56:32


Hello and welcome back!It's been a bit of a hiatus for us here at Security Explained, but we're BACK in action and kicking things off with a casual conversation with our good friend Samy Kamkar.Samy has been a staple in the infosec community for years and even has a worm named after him (the Samy Worm!). He's got a list of wild projects longer than most resumes and has recently been part of an acquisition in his role at OpenPath.Join us for a fun conversation with one of the sharpest hackers you're likely to meet!Samy Kamkarhttps://samy.plhttps://www.openpath.com/https://twitter.com/samykamkar

The Amp Hour Electronics Podcast
#552 – Shouting at chips with Colin O’Flynn

The Amp Hour Electronics Podcast

Play Episode Listen Later Aug 2, 2021 64:11


Welcome back, Colin O'Flynn of NewAE Technology! He was last on the show for episode 239 in 2015, as he was releasing the Chip Whisperer We recorded this all on video as well: https://www.youtube.com/watch?v=QRGPltf0KBg Colin is an assistant professor at Dalhousie University, where he got his PhD. He is moving out of that role (and likely into a role as an Adjunct) as of 8/31. Private sector, FTW! Side channel analysis Colin has been testing the security of the doorlocks on his new building Samy Kamkar was on episode 308, and is now working on a smart doorlock system. Jon Beri (ep 526) also mentioned doorlock security and the vertical nature of the industry The point of university Colin is doing remote training for Black Hat this year. Getting access to the pins on the Apple AirTag "Wibbly wobbly, timey wimey, What's really inside Apple's U1 Chip" Apple U1 Chip advancedsecurity.training Meetups The new(er) Chip Shouter kit is for Fault Injection Colin tried it on early Trezor wallets It's surprising there isn't a stamp of approval like a UL certification for embedded device security. How can you test your product for security issues? The ARM PSA is a self checklist and certification program. Colin has been working on The Hardware Hacking Handbook with Jasper van Woudenberg. The book is due out in November. Smart Locks - Schlage Starlink dish Ransomware for IoT Dumping firmware Unlocking firmware Sourcing woes ChipWhisperer Husky is coming out soon, keep an eye on Crowd Supply for the latest news about the Colin has been using his Desktop PNP less often How should you get started? Try the ChipWhisperer Nano Colin is taking Matt Venn's Zero to ASIC course

DataSnak
DataSnak ep 126 SommerSnak 2

DataSnak

Play Episode Listen Later Jul 26, 2021 34:01


Vi har fundet en håndfuld videoer, som vi deler med hinanden til diskussion i studiet i denne nummer to af tre sommer-episoder. Og vi skal vidt omkring – fra digital undertrykkelse over et fysikeksperiment til filmkritik. Adam har fundet sitet Digital Violence, der er en kolossal og kompleks datavisualisering af den frygtelige historie om et israelsk firma, hvis overvågningssoftware bruges til at tracke og chikanere både journalister, advokater og dissidenter. I en helt anden boldgade viser Jeppe tre videoer fra Veritasium, som handler om et projekt med en slags vinddrevet gokart, og de diskussioner med fysikere, der følger i slipstrømmen på eksperimentet. Anders kigger på hackerfilm og tvserier i selskab med Samy Kamkar, der fortæller hvor realistiske de viste hacks egentlig er. LINKS Sitet Digital Violence Veritasium-vindbilen – video 1, 2 og 3 Wired Technique Critique om hacking – og om spionsatellitter PRAKTISK DataSnak har fokus på it-faglige og it-politiske emner, og nørder igennem med alt fra automatisering over sikkerhed til uddannelse i den digitale verden. Podcasten behandler også SAMDATAHKs relevante aktiviteter såsom kurser, faglige initiativer, kommunikation og værktøjer og tilbud, som man kan få, når man er it-medlem i HK. Formål er at gøre lytterne klogere på hvad der sker i deres arbejdsliv her og nu og i fremtiden, og gå i dybden med problemstillinger fra it-professionelles hverdag. Tovholderen på podcasten er it-faglig konsulent Jeppe Engell. De øvrige to værter er Adam Bindslev og Anders Høeg Nissen. DataSnak udkommer hveranden mandag. Tak fordi du lytter med! Får du lyst til at komme med ris og ros, kan du sende en e-mail til jeppe.engell@hk.dk - og hvis du har tekniske spørgsmål eller kommentarer kan de sendes til anders@podlab.dk

Embedded
370: This Is the Whey

Embedded

Play Episode Listen Later Apr 22, 2021 58:55


Alvaro Prieto (@alvaroprieto) spoke with us about cheese, making, work, the reverse engineering podcast, weather, and motivation. Alvaro is a host of the Unnamed Reverse Engineering podcast. Some of his favorite episodes include #41 with Samy Kamkar, #14 with Joe Grand, and #23 with Major Malfunction. (Jen Costillo co-hosts the show and has been on Embedded several times.) Alvaro works at Sofar Ocean, making oceanic sensing platforms. He has a personal website linking to his other exploits. We talked about some Embedded episodes as well: #282 with Laughlin Barker about OpenROV #174 with Evan Shapiro about baby monitors and professional poker  Also, we’ve all really enjoyed the Disney’s Mandolorian.

disney embedded mandolorian whey evan shapiro samy kamkar joe grand jen costillo
Junior to Senior with David Guttman
Samy Kamkar, co-founder of Openpath Security

Junior to Senior with David Guttman

Play Episode Listen Later Nov 30, 2020 46:44


Samy brings us on his journey from hacker to security engineer, passion for self projects, and networking at tech events.

Security Nation
How Rick Holland's Diverse Experience Helps Him Find Security Talent in Unique Places

Security Nation

Play Episode Listen Later Nov 18, 2020 46:15


In our latest episode of Security Nation, Rick Holland joined the podcast to discuss how his past informs his present, particularly when it comes to sourcing and hiring the best talent. Rick elaborates on how a lack of direct reports—for several years across multiple companies—led to a bit of imposter syndrome when he became CISO at Digital Shadows and suddenly was tasked with staffing and managing a team. Sometimes smaller talent pools can lead to inspired hiring choices. Stick around for our Rapid Rundown, where Tod delves into Samy Kamkar's NAT slipstreaming mechanism in which an attacker can trick a router into opening straight-shot ports to any listening service on a machine.  

Risky Business
Risky Business #604 -- Election-related cyber shenanigans fail to materialise

Risky Business

Play Episode Listen Later Nov 11, 2020


On this week’s show Patrick and Adam discuss the week’s security news, including: Zoom settles with FTC over misleading E2EE claim Some poor sod had to give up $1bn in Bitcoin Solaris SSH 0day? Let’s party like it’s 1999 Samy Kamkar’s latest trick: NAT Slipstreaming Australia’s hardcore critical infrastructure protection bill Much, much more This week’s show is brought to you by Remediant. Company co-founder Paul Lanzi joins the show in this week’s sponsor interview to talk about how they’ve been helping companies recover from ransomware attacks. Maybe listen to this one. You know. Just in case you find yourself in that situation one day? Links to everything that we discussed are below and you can follow Patrick or Adam on Twitter if that’s your thing. Show notes Zoom settles FTC charges for misleading users about security features | ZDNet Someone has transferred ~$1 billion from a bitcoin wallet quiet since 2015 | Ars Technica The feds just seized Silk Road’s $1 billion stash of bitcoin | Ars Technica Hacker group uses Solaris zero-day to breach corporate networks | ZDNet NAT Slipstreaming hack tricks firewalls and routers | The Daily Swig Australia's hardcore critical infrastructure laws open to challenge - Risky Business 23,600 hacked databases have leaked from a defunct 'data breach index' site | ZDNet More suspected North Korean malware identified after US alert on Kimsuky hackers Suspected North Korean hackers who targeted job applicants prove more ambitious than first believed The many personalities of Lazarus - Risky Business Windows 10, iOS, Chrome, and many others fall at China's top hacking contest | ZDNet Linux version of RansomEXX ransomware discovered | ZDNet Cyberattack on U. of Vermont hospital IT network delays chemotherapy, mammogram appointments Building wave of ransomware attacks strike U.S. hospitals | Reuters Why Paying to Delete Stolen Data is Bonkers — Krebs on Security Israeli companies targeted with new Pay2Key ransomware | ZDNet Capcom takes systems offline following cyber-attack | The Daily Swig Company that runs US illegal immigration detention centers discloses ransomware attack | ZDNet Ransomware Hits Dozens of Hospitals in an Unprecedented Wave | WIRED Italian beverage vendor Campari knocked offline after ransomware attack | ZDNet Compal, the second-largest laptop manufacturer in the world, hit by ransomware | ZDNet Toy maker Mattel discloses ransomware attack | ZDNet Wisconsin Republicans say last minute hack cost party $2 million meant to reelect Trump FBI: Hackers stole source code from US government agencies and private companies | ZDNet Pwned: Deloitte Hacker IQ game forced offline after hack | The Daily Swig Russian authorities make rare arrest of malware author | ZDNet CERT/CC launches Twitter bot to give security bugs random names | ZDNet Oracle publishes rare out-of-band security update for WebLogic servers | ZDNet Apple fixes three iOS zero-days exploited in the wild | ZDNet After two zero-days in Chrome desktop, Google patches a third zero-day in the Android version | ZDNet Google’s Project Zero discloses Windows 0-day that’s been under active exploit | Ars Technica Google discloses Windows zero-day exploited in the wild | ZDNet Google patches second Chrome zero-day in two weeks | ZDNet ACOS/aGalaxy GUI RCE Vulnerability – CVE-2020-24384 – A10 Support Infamous ‘Hoax’ Artist Behind Trumpworld’s New Voter Fraud Claim (1) Matthew Gertz (@MattGertz) / Twitter

Unnamed Reverse Engineering Podcast
041 - What did you fail at this week?

Unnamed Reverse Engineering Podcast

Play Episode Listen Later Nov 7, 2020 91:45


Jen and Alvaro chat with Samy Kamkar about his new NAT Slipstreaming research and a lot more! Samy is the co-founder of Openpath Security. You can find him on twitter @samykamkar and  on his website https://samy.pl. Here are links to some of the topics we covered: NAT Slipstreaming Mr. Robot draw.io  DNS SIP Protocol HTTP Protocol OSI Layer IP Fragmentation RFCs IP Fragmentation RFC 791 WebRTC UPnP Netfilter Binwalk ALG IDA Pro Ghidra Rolljam - Car unlocker David Shorey (Patreon) Iridescent Chocolate Fravia.com (archived) Fravia’s Pages of Reverse Engineering RAM Cold Boot Attack Biospeckle Live Imaging Evernote Notion.so Samytools on Github Rigol Oscilloscopes Saleae Sigrok Amscope Microscopes Othermill/Bantam Tools Cloud Chamber Have comments or suggestions for us? Find us on twitter @unnamed_show,  or email us at show@unnamedre.com. Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)

IGeometry
Remotely access any TCP/UDP service bound to a victim machine - Let us discuss NAT Slipstreaming

IGeometry

Play Episode Listen Later Nov 2, 2020 19:44


Ever heard of HTTP Smuggling? will this is smuggling a TCP packet into an HTTP body so that it can be interpreted by the router to open internal ports to your machine. NAT Slipstreaming was discovered by Samy Kamkar, Article and research by @SamyKamkar https://samy.pl/slipstream/ --- Send in a voice message: https://anchor.fm/hnasr/message

Lock and Code
Investigating digital vulnerabilities in our physical world with Samy Kamkar

Lock and Code

Play Episode Listen Later Sep 28, 2020 32:01


A recent history of hacking shows the importance of experimentation. In 2015, security researchers hacked a Jeep Cherokee and took over its steering, transmission, and brakes. In 2019, researchers accessed medical scanning equipment to alter X-ray images, inserting fraudulent, visual signs of cancer in a hypothetical patient.Today, we're discussing one such experiment—a garage door opener called “Open Sesame.”Join us for a discussion with "Open Sesame"'s developer, who is also the chief security officer and co-founder of Open Path, Samy Kamkar, to hear about how his tool works, and who holds responsibility for protecting against modern attacks.

The InfoSec & OSINT Show
23 - Samy Kamkar & Reverse Engineering

The InfoSec & OSINT Show

Play Episode Listen Later Sep 3, 2020 44:30


This week Samy Kamkar hung out to talk about some of his adventures creating worms and zombie drone armies with a focus on his process for reverse engineering both software and hardware. My three main takeaways were how he created cheats on Counter-Strike, how he created one of the fasting spreading viruses of all time and why he finds the physical access control problem interesting. For more information, including the show notes check out https://breachsense.io/podcast

Talking Tech with Jefferson Graham
Explainer: how those new contact tracing apps will work

Talking Tech with Jefferson Graham

Play Episode Listen Later Apr 17, 2020 6:04


Samy Kamkar, the chief security officer for Openpath, explains how the new contact tracing apps from Apple and Google will work to combat COVID-19.

Darknet Diaries
61: Samy

Darknet Diaries

Play Episode Listen Later Mar 17, 2020 63:11


Samy Kamkar is a hacker. And while he’s done a lot of stuff, he’s best known for creating the Samy Worm. Which spread its way through a popular social media site and had crazy results. Thanks to our guest Samy Kamkar for telling his story. Learn more about him by visiting https://samy.pl/. Sponsors This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25. Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial. Sources Samy’s YouTube Channel Video: MySpace Worm Animated Story https://samy.pl/myspace/ https://www.vice.com/en_us/article/wnjwb4/the-myspace-worm-that-changed-the-internet-forever Learn more about your ad choices. Visit megaphone.fm/adchoices

The Story Collider
Love and Technology: Stories about the technology that alters our lives

The Story Collider

Play Episode Listen Later Feb 7, 2020 35:14


Vote for your favorite Story Collider story of all time here: https://airtable.com/shreBxfsM5XYktIT5 This week we present stories from people who navigated our changing relationship to technology. Part 1: As a kid, Samy Kamkar discovers his superpower -- hacking. Part 2: When Jordan Bush's father-in-law-to-be is diagnosed with cancer shortly before her wedding, she finds a creative way to help him attend. Samy Kamkar is a cofounder of Openpath, security researcher, and huge nerd. His open source hardware and software highlight the insecurities in everyday technologies, such as weaponizing a children's toy to unlock cars, designing clandestine wireless keyboard sniffers hidden into mobile phone chargers, and building drones that wirelessly hijack and control swarms of other drones. His work has been cited by the NSA, triggered hearings on Capitol Hill, and has been the basis for security advancements across vehicles, smartphones, and other technologies. Jordan is finishing up her dissertation in Ecology and Evolutionary Biology at the University of Tennessee Knoxville. Her research focuses on when and where lizards fight over territories. She asks that you not confuse her obsession with lizards as a general interest in all reptiles - she does not like snakes, keep your snakes to yourself. After graduating, she has a real goal of becoming a professor at a liberal arts college, and a secret goal of becoming a science journalist and children's book author. She currently lives in Knoxville, TN with her wonderful husband, two babies, and two dogs. Learn more about your ad choices. Visit megaphone.fm/adchoices

PlaceTech Podcast
Samy Kamkar on security in real estate

PlaceTech Podcast

Play Episode Listen Later Dec 19, 2019 26:00


Samy Kamkar, privacy and security researcher and cofounder of Openpath, joined PlaceTech to chat about the security threats in real estate, the time he was arrested by the US secret services and three simple steps companies can take to prevent being hacked. The podcast was hosted by PlaceTech reporter, Nicola Byrne. This PlaceTech Podcast is sponsored by Essensys.

Inside Security Intelligence
135 From Infamous MySpace Wormer to Open Source Advocate

Inside Security Intelligence

Play Episode Listen Later Nov 25, 2019 21:27


If you are of a certain age — an age where you may have spent a good bit of your time online using Myspace — you may recall an incident with the Samy worm, which in 2005 spread through Myspace so quickly and uncontrollably that they had to temporarily shut the service down to regain control. It was, by all accounts, a prank that got out of hand, but the authorities were not amused, and Samy Kamkar, who wrote the worm, was eventually sentenced to probation, community service, and a hefty fine. Since then, Samy Kamkar has set his sights on security research, with a specific focus on open source software. We caught up with Samy at Recorded Future's RFUN: Predict 2019 conference in Washington, D.C., where he was delivering one of the keynote presentations.

Recorded Future - Inside Threat Intelligence for Cyber Security
135 From Infamous MySpace Wormer to Open Source Advocate

Recorded Future - Inside Threat Intelligence for Cyber Security

Play Episode Listen Later Nov 25, 2019 21:28


If you are of a certain age — an age where you may have spent a good bit of your time online using Myspace — you may recall an incident with the Samy worm, which in 2005 spread through Myspace so quickly and uncontrollably that they had to temporarily shut the service down to regain control. It was, by all accounts, a prank that got out of hand, but the authorities were not amused, and Samy Kamkar, who wrote the worm, was eventually sentenced to probation, community service, and a hefty fine. Since then, Samy Kamkar has set his sights on security research, with a specific focus on open source software. We caught up with Samy at Recorded Future’s RFUN: Predict 2019 conference in Washington, D.C., where he was delivering one of the keynote presentations.

Getting Into Infosec
Adrian Kaylor - From Network Admin to Trainer to Sales Engineer for Life

Getting Into Infosec

Play Episode Listen Later Feb 21, 2019 38:26


Adrian is a Sr Sales Engineer with Splunk who focuses on security. He has worked for various security startups in the bay area for the past 15 years from vulnerability management, to endpoint investigation, to ML based threat hunting. Notes: Had an interest in security early on, starting with opening binaries on Sierra's King's Quest games and looking for hints. Took any opportunity he got to get exposed to security His job as an instructor was very useful during support and later as a sales engineer Keeps a Trello board for his lab!! Adrian expenses (deducts) what he spends on his lab from his taxes. (Consult a tax attorney) He mentions an awesome hack for installing Kali on a chromebook (~22 mins) Quotes: "I remember the first time I found Phrack, my mind exploded a little bit." "Experience is experience, everything that you use [skills] will get used later on." "...figure out what pieces their missing, so you can fill them in." "Go through the CIS top 20 critical controls" "Be less focused on the whizbang fun stuff, and more focused to get you the most return." Links: Please thank my guests for sharing their time with us and let them know if this episode helped you. Adrian Kaylor on Twitter: https://twitter.com/AdrianKaylor Adrian Kaylor on LinkedIN: https://www.linkedin.com/in/adriankaylor/ Phrack Magazine: http://www.phrack.org/ Lack Rack: https://www.google.com/search?q=ikea+lack+rack&source=lnms ISS: https://www-03.ibm.com/press/us/en/pressrelease/20468.wss Splunk Dev License: http://dev.splunk.com/ CIS 20 Controls: https://en.wikipedia.org/wiki/The_CIS_Critical_Security_Controls_for_Effective_Cyber_Defense JA3: https://github.com/salesforce/ja3 Irongeek: http://www.irongeek.com/ Netsec Reddit: https://reddit.com/r/netsec SANS Holiday Hack Challenge: https://www.holidayhackchallenge.com/2018/ Garage Door Hack by Samy Kamkar: http://samy.pl/opensesame/ Sam Bowne's Class: https://samsclass.info Adrian's Presentation on YouTube: https://www.youtube.com/watch?v=8LF96Oq_pgo (Picture of lab at 24:05) Intro Music by Trash80: Outro Music (Liberation Theology - Exploitation is Sin): https://open.spotify.com/album/0oc93ZsbMluxL8H994U9MW Learning Resource Mentioned: https://www.youtube.com/watch?v=6MYF6Zo6i6A based on: https://www.coursera.org/learn/it-security Getting Into Infosec: Twitter: https://twitter.com/coffeewithayman YouTube: https://www.youtube.com/channel/UCg6gV_gdfc188HZdN8LUx4A Book: https://www.amazon.com/Breaking-Step-Step-Starting-Information-ebook/dp/B07N15GTPC/

Made You Think
11: This Podcast Will Save Your Life: Emergency by Neil Strauss

Made You Think

Play Episode Listen Later Nov 7, 2017 112:50


The difference in even doing a little bit of preparation between doing nothing for a disaster is massive. Today we’re discussing what you should know about preparing for doomsday, centered around the book “Emergency” by Neil Strauss. What will you do when a massive hurricane, earthquake, or fire hits? When a terrorist attack happens? When the power grid goes down and you’re stuck in your home with rapidly depleting supplies? These aren’t fun topics to think about… but it’s better to plan for them now than suffer the consequences of hiding our heads in the sand. We cover a wide range of topics, including: Surviving various disasters and life-threatening situations Minimizing your damage from threats and disasters Protecting yourself from terrorist threats Future societal outcomes after apocalyptic events Leaving the country to avoid disaster Hiding caches and finding water Utilizing the five flag system for optimal security And much more. Please enjoy, and be sure to grab a copy of Emergency and to check out Nat’s notes on the book! If you enjoyed this episode, be sure to check out our episode on Antifragile, to learn how to turn chaos to your advantage. Our episode on The Sovereign Individual, to better prepare yourself for the cyber-economic future. And last, our episode on cryptocurrency, to learn how cryptocurrency works and how it can benefit you. Mentioned in the show: New York Times [1:10] Made You Think episode on Cryptocurrency [3:48] Made You Think episode on The Sovereign Individual [4:09] Infowars [5:07] Lord of the Flies [15:35] Made You Think episode of The Power of Myth [18:24] The Federalist Papers [25:10] FEMA [28:32] Article on the Dutch flooding risks [31:53] 500 Startups [36:53] Y Combinator [36:54] Start-Up Chile [37:34] Estee Lauder [40:20] Sovereign Man article on places to get a passport [41:27] Made You Think episode on Amusing Ourselves to Death [43:50] Huffington Post [44:53] Fox News [44:54] Pocket app [45:40] Doomsday Planning for Less Crazy Folk [51:45] Bug Out Bag [1:01:52] (Bug Out Bag essentials checklist) Nat Chat podcast [1:05:28] CERT Training [1:04:30] The guy who fasted for over a year [1:08:16] Documentary on Koreatown protecting itself [1:13:56] New Yorker article on interviewing North Koreans [1:22:23] Making a solar still [1:26:50] Online simulation on a population and dying [1:43:15] Tesla [1:48:23] Nat Chat episode with Zak Slayback [1:48:55] Books mentioned: Emergency (Nat’s Notes) The Game [1:03] (Nat’s Notes) The Truth [1:05] (Nat’s Notes) The Sovereign Individual [4:09] (Nat’s Notes) The Lean Startup [7:30] (Nat’s Notes) Amusing Ourselves to Death [43:50] (Nat’s Notes) Contagious [46:36] (Nat’s Notes) Deep Survival [1:25:22] Man’s Search for Meaning [1:26:05] (Nat’s Notes) People mentioned: Neil Strauss Ariana Grande [3:30] Adil Majid [3:48] Taylor Pearson [3:50] Alex Jones [4:49] Jordan Peterson [10:50] Carl Jung [10:54] Madison and Hamilton [25:16] George W. Bush [28:24] Rodney King [51:10] Nassim Taleb [51:48] Laurence Gonzales (author) [1:25:22] Viktor Frankl [1:26:05] Samy Kamkar [1:45:48] Elon Musk [1:48:23] Zak Slayback [1:48:55] Related links: Nat’s 5-day water fast article 0:00 - Powerful introductory quote, the beginning of the discussion, and some information on what the book’s about. 4:39 - Some thoughts on prepping and some popular misconceptions with prepping. Also, thoughts on why you may want to get into prepping for disasters. 7:27 - Discussion on various disaster scenarios, looting, gangs, and the social unrest that arises. Also, how these situations can make us irrational. 11:50 - Thoughts on various genocides around the world and the death tolls of them. 15:00 - The author’s perspective on possible outcomes during various apocalyptic events and some discussion on these events. Also, some talk regarding tribes and the events that happened from the year 1900 and onwards. 20:33 (Tangent #1) Discussion on what may happen with nation states and states succeeding in regards to war. Also, some talk about various laws and types of governments. 27:46 - The author’s three strategies regarding various disasters and surviving them. Also, some information on why rescue teams don’t always show up as soon as the disasters happen and some thoughts on how many people have died during recent natural disasters. 33:48 - The first challenge of escaping. Describing the five flag system and detailing how to go about achieving that system. Also, evading income tax by living in Puerto Rico and getting paid to start a business there, same with Chile. 42:23 - Some signs that you should leave the country and some discussion on these signs. Also, discussion on the media being warped to make us think a certain way. 46:30 - What makes things go viral and get shared. Some thoughts on these driving forces. Also, how much it typically would cost to achieve the five flag system mentioned earlier. 49:56 - The next part on surviving these disasters and traveling away from the country to avoid possible disasters. 52:30 - Some more discussion on survival, hunting, diet, and training yourself to survive beforehand, especially training your instincts. Also, some in-depth discussion on escaping from Long Island and the usefulness of being able to sail. 1:04:26 - How the author learned how to do all of these things. Also, the three qualities and the three skills that will help you out greatly in various disasters. What you should learn to survive in various situations mentioned, as well. 1:09:00 - Urban survival versus wilderness survival and some thoughts on this. Some talk about protecting yourself with weapons and owning guns, as well. 1:16:42 - What you should do first when a disaster hits and what you should do last. 1:18:42 - Where to find safe drinking water in your home if you run out of water. Also, storing water, protecting yourself from nuclear threats, and some talk on bomb threats in general. 1:23:20 - What to do if you’re in a building where a bomb explodes, minimizing damage from shooters, what to watch out for when lost, information on solar stills, and the minimum amount of water needed daily for survival. 1:31:05 - Some other things that you can do to help your survival chances. 1:36:20 - Information on hiding items and caches, and some more information on finding water and drinking from streams. 1:39:36 - The last section on rescuing and EMT training. Also, what’s currently most likely to kill you here in America. 1:44:23 - (Tangent #2) Self-driving and the possible fragility of the self-driving system. Some thoughts on security, hacking, driving, and fossil fuels, as well. 1:49:34 - Wrap-up. Some last thoughts on surviving various disasters and prepping. If you enjoyed this episode, don’t forget to subscribe at https://madeyouthinkpodcast.com People who can stay rational and who can maintain hope, tend to always survive these dire scenarios more.

Security – Software Engineering Daily
Security Research with Samy Kamkar

Security – Software Engineering Daily

Play Episode Listen Later Jan 4, 2017 62:36


Every digital system has vulnerabilities. Cars can be hacked, locked computers can be exploited, and credit cards can be spoofed. Security researchers make a career out of finding these types of vulnerabilities. Samy Kamkar’s approach to security research is not just about dissection–it’s also about creativity. For many of the technologies he hacks on, Samy The post Security Research with Samy Kamkar appeared first on Software Engineering Daily.

Friends Without Benefits
42: Samy Kamkar

Friends Without Benefits

Play Episode Listen Later Apr 26, 2016 44:08


I talk to Samy Kamkar about hacking and stuff. Be a part of the show! Check us out on iTunes! bit.ly/jasonhortonpod Samy Kamkar: http://samy.pl/ Snapchat: thejasonhorton YouTube: bit.ly/subhorton Facebook: www.facebook.com/thejasonhorton Twitter: twitter.com/jason_horton Instagram: instagr.am/thejasonhorton Sideshow Network: www.sideshownetwork.tv Learn more about your ad choices. Visit megaphone.fm/adchoices

snapchat samy kamkar sideshow network
DEF CON 23 [Audio] Speeches from the Hacker Convention
Samy Kamkar - Drive it like you Hacked it - New Attacks and Tools to Wirelessly Steal Cars

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Oct 16, 2015


Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Samy-Kamkar-README.txt Extras: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Samy-Kamkar-Extras.rar Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars Samy Kamkar Gary Numan said it best. Cars. They’re everywhere. You can hardly drive down a busy freeway without seeing one. But what about their security? In this talk I’ll reveal new research and real attacks in the area of wirelessly controlled gates, garages, and cars. Many cars are now controlled from mobile devices over GSM, while even more can be unlocked and ignitions started from wireless keyfobs over RF. All of these are subject to attack with low-cost tools (such as RTL-SDR, GNU Radio, HackRF, Arduino, and even a Mattel toy). We will investigate how these features work, and of course, how they can be exploited. I will be releasing new tools and vulnerabilities in this area, such as key-space reduction attacks on fixed-codes, advanced "code grabbers" using RF attacks on encrypted and rolling codes, and how to protect yourself against such issues. By the end of this talk you’ll understand not only how vehicles and the wirelessly-controlled physical access protecting them can be exploited, but also learn about various tools for car and RF research, as well as how to use and build your own inexpensive devices for such investigation. Ladies and gentlemen, start your engines. And other people’s engines. Samy Kamkar is a security researcher, best known for creating The MySpace Worm, one of the fastest spreading viruses of all time. He (attempts to) illustrate terrifying vulnerabilities with playfulness, and his exploits have been branded: “Controversial”, -The Wall Street Journal “Horrific”, -The New York Times “Now I want to fill my USB ports up with cement”, -Gizmodo He’s demonstrated usurping typical hardware for surreptitious means such as with KeySweeper, turning a standard USB wall charger into a covert, wireless keyboard sniffer, and SkyJack, a custom drone which takes over any other nearby drones allowing them to be controlled as a massive zombie swarm. He’s exposed issues around privacy, such as by developing the Evercookie which appeared in a top-secret NSA document revealed by Edward Snowden, exemplifying techniques used by governments and corporations for clandestine web tracking, and has discovered and released research around the illicit GPS and location tracking performed by Apple, Google and Microsoft mobile devices. He continues to produce new research and tools for the public as open source and open hardware. Twitter: @samykamkar

Geeks and Beats
The Merch Awakens

Geeks and Beats

Play Episode Listen Later Sep 8, 2015 41:45


Hands-on: the Star Wars drone, even if it is the fastest hunk of junk in the galaxy, you shouldn’t buy it. Stealing cars the high tech way: We’ll introduce you to Samy Kamkar who not only broke Myspace, but the hearts of auto industry technicians worldwide. Get your pencils ready — The cassette is back. We’ll tell you why the only major manufacturer is seeing sales rise. Plus — Technics is getting back into the turntable business. Just bring your own toner arm and copy of Dark Side of the Moon. And attention travelers: we’re giving away a gadget that will ensure you always know where your lost luggage is. The post The Merch Awakens appeared first on The Geeks and Beats Podcast with Alan Cross and Michael Hainsworth.

Paul's Security Weekly
Security Weekly #428 - Interview with Samy Kamkar

Paul's Security Weekly

Play Episode Listen Later Jul 28, 2015 110:06


This week we interview Samy Kamkar who [redacted]. All that and more so stay tuned!

security weekly samy kamkar
The Tim Ferriss Show
#74: How a Computer Hacker Optimizes Online Dating, Opens Locked Cars, and Hijacks Drones

The Tim Ferriss Show

Play Episode Listen Later May 2, 2015 160:51


Samy Kamkar is one of the most innovative and notorious computer hackers in the United States. He’s also a well-known whistleblower. If you want how Samy hacks everything from online dating to car alarms, this episode is for you. He is best known for creating the fastest spreading virus of all time, a MySpace worm named “Samy.” He got raided by the United States Secret Service for that one. More recently, he’s created SkyJack, a custom drone that hacks into any nearby drones, allowing him (or any operator) to control a swarm of devices; and Evercookie, which appeared in top-secret NSA documents revealed by Edward Snowden. He also discovered illicit mobile phone tracking by Apple iPhone, Google Android and Microsoft Windows Phone mobile devices, which were transmitting GPS and Wi-Fi information to their parent companies. His research and findings led to a series of class-action lawsuits against these companies and a privacy hearing on Capitol Hill. To see Samy help me hack my online dating, check out the “Dating Game” TV episode here: http://itunes.com/timferriss Here is Samy’s site (http://samy.pl/), his outstanding YouTube channel (https://www.youtube.com/channel/UC4m2G6T18_JcjwxwtwKJijw), and his Twitter (https://twitter.com/samykamkar). This episode is brought to you by two companies I use myself: 99Designs — http://99designs.com/tim Mizzen & Main — http://mizzenandmain.com/collections/tim Enjoy!***If you enjoy the podcast, would you please consider leaving a short review on Apple Podcasts/iTunes? It takes less than 60 seconds, and it really makes a difference in helping to convince hard-to-get guests. I also love reading the reviews!For show notes and past guests, please visit tim.blog/podcast.Sign up for Tim’s email newsletter (“5-Bullet Friday”) at tim.blog/friday.For transcripts of episodes, go to tim.blog/transcripts.Interested in sponsoring the podcast? Visit tim.blog/sponsor and fill out the form.Discover Tim’s books: tim.blog/books.Follow Tim:Twitter: twitter.com/tferriss Instagram: instagram.com/timferrissFacebook: facebook.com/timferriss YouTube: youtube.com/timferriss