No video

Proxyjacking for Profit: The Latest Cybercriminal Side Hustle

  Рет қаралды 31,892

Southern California Linux Expo

Southern California Linux Expo

Күн бұрын

Пікірлер: 51
@zgintasz
@zgintasz Ай бұрын
Is this new? I suspected proxyjacking the first time I saw a service named “residential proxies”
@eyezikandexploits
@eyezikandexploits Ай бұрын
Great talk loved the breakdown
@ma34529
@ma34529 20 күн бұрын
Great presentation!
@BillAnt
@BillAnt Ай бұрын
A proxy is similar to a VPN for changing different static or dynamic IP's. The only difference difference is that a VPN also encrypts the DNS requests. I'm using a proxy every day for my business to access certain sites, because changing IP's forces me to log in an verify it again the IP again. It's a completely legit use.
@bobbyrandomguy1489
@bobbyrandomguy1489 Ай бұрын
A proxy does not inherently promise encryption. All VPN connections provide encryption. Just make sure you use the correct protocols!
@BillAnt
@BillAnt Ай бұрын
​@@bobbyrandomguy1489 - That what I said, a proxy is just for changing IP's. But with 99% of websites nowadays the actual traffic is encrypted via HTTPS/TTS. The only things a VPN is better at, is hiding DNS queries so an attacker won't know the url/IP of the sites you're visiting. Honestly I don't trust either proxy and VPN services, could be honey-pots all we know. "Trust me bro, no logs!" lmao
@exciteproductions4two0
@exciteproductions4two0 Ай бұрын
​@@bobbyrandomguy1489tell that to lemons vpn after they sold all their customers information to a Chinese web company.
@Heapsray
@Heapsray Ай бұрын
This claim is false
@Heapsray
@Heapsray Ай бұрын
A VPN completely replicates the network stack and encapsulates it in an encrypted way, while a proxy just forwards requests for you and acts as man-in-the-middle
@andresdelorbe9638
@andresdelorbe9638 Ай бұрын
I really miss the old linode logo !
@lootclan5842
@lootclan5842 Ай бұрын
fr
@KIP-lh1ln
@KIP-lh1ln Ай бұрын
I see proxyjacking as a risk to the victims, as high risk traffic could be tunneled to these unsuspecting victims.
@ChantelleMylanz-v7b
@ChantelleMylanz-v7b Ай бұрын
Exactly
@Lugnear
@Lugnear Ай бұрын
Hello did you inform the the libyan company of there website ? I am in libya now and very interested in investigating it
@gooniesfan7911
@gooniesfan7911 Ай бұрын
im hearing impaired and the transcript is hard to search through. is this vulnerability involving modifying DNS requests via the proxy end?
@CyberSnakeEater
@CyberSnakeEater Ай бұрын
I just started watching so i can't answer, but maybe you could benefit from a strategy I use to study: I copy and paste the transcript into an AI and ask it questions
@bearwolffish
@bearwolffish Ай бұрын
@@CyberSnakeEater You verify the answers the AI gives you?
@rxpe
@rxpe Ай бұрын
Via the proxy end? It's just using infected machines as proxies and selling their access.
@MacGuffin1
@MacGuffin1 Ай бұрын
Yeah IU cant read his overhead stuff on a very large screen in 4k :[
@rebane2001
@rebane2001 Ай бұрын
16:35 no thats not the right hackernews 😭
@Akash.Chopra
@Akash.Chopra Ай бұрын
Please move the mic away from the center of your mouth bro..
@ChantelleMylanz-v7b
@ChantelleMylanz-v7b Ай бұрын
This is evil
@youssefaghayou6875
@youssefaghayou6875 Ай бұрын
W
@nevergoon4315
@nevergoon4315 Ай бұрын
This talk is easily 14 years out of relevance.
@andrewferguson6901
@andrewferguson6901 Ай бұрын
That would mean something if vulnerabilities 14 years out of relevance werent still being exploited for fun and profit
@nevergoon4315
@nevergoon4315 Ай бұрын
​@@andrewferguson6901 Fun and profit is a dog-headed point of view. Do you think you are better than a dog? The most successful hackers are god-headed political idealogues with tragic tales; not run of the mill crooks or goons. Political idealogues look at crypto and networking technology companies and sees it for what it is. State-sponsored fascism with a bunch of pretty graphs. If you can't learn to understand the motives of your adversaries you can never hope to stop them, much less compete with them. Low-brow attacks like what this talk covers only exists because this country is one large honeypot. Hackers know better than professionals what is real and what is not.
@ericschroeman5020
@ericschroeman5020 Ай бұрын
eh not really, some is old info but most is pretty current
@bezillions
@bezillions Ай бұрын
If it's not patched or moot it's relevant
@vuufke4327
@vuufke4327 Ай бұрын
Entirely useless talk, save you time.
@MouadScriptz
@MouadScriptz Ай бұрын
not true
@frag0638
@frag0638 Ай бұрын
This is 15 years late
@vuufke4327
@vuufke4327 Ай бұрын
@@frag0638 proxyjacking has been a thing pretty much from the day smartphones became popular, I wouldn't call it "the latest side hustle"
@corpingtons
@corpingtons Ай бұрын
How is it useless it’s still being used? If a computer has malware anything is possible if it’s ud
Secure Consumption of Open Source Software: Evaluating, Utilizing, and Contributing Safely
35:59
Proxyjacking: The Latest Cybercriminal Side Hustle
31:19
SANS Offensive Operations
Рет қаралды 1 М.
Кадр сыртындағы қызықтар | Келінжан
00:16
SPONGEBOB POWER-UPS IN BRAWL STARS!!!
08:35
Brawl Stars
Рет қаралды 17 МЛН
Challenge matching picture with Alfredo Larin family! 😁
00:21
BigSchool
Рет қаралды 43 МЛН
Whoa
01:00
Justin Flom
Рет қаралды 20 МЛН
Hackers Abuse Zero-Day Exploit for CrushFTP
31:49
John Hammond
Рет қаралды 69 М.
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor
48:29
Hackers Find Missing People For Fun
6:07
Freethink
Рет қаралды 19 МЛН
Watch a Hacker break into a WordPress Website!!! 😱
12:22
Jamie Marsland
Рет қаралды 7 М.
new vulnerability in your motherboard lasts forever
8:08
Low Level Learning
Рет қаралды 225 М.
How $8 Billion fraud was hidden in the source code | FTX
18:04
Coding with Dee
Рет қаралды 96 М.
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 1,9 МЛН
Why Hacking is the Future of War
31:45
Johnny Harris
Рет қаралды 2,6 МЛН
Кадр сыртындағы қызықтар | Келінжан
00:16