Transcription improvements made for hire through Amazon Mechanical
Turk. Sponsored by: FreeBSD Foundation
This commit is contained in:
parent
a32dc77814
commit
f2a3b4d0f3
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=35337
1 changed files with 57 additions and 57 deletions
|
|
@ -87,7 +87,7 @@ we’ve lost like three hundred billion in market cap over
|
|||
the last year it’s been an exciting ride
|
||||
|
||||
0:01:22.110,0:01:25.230
|
||||
the ads general electric we get three hundred thousand users
|
||||
the ads General Electric we get three hundred thousand users
|
||||
|
||||
0:01:25.230,0:01:28.360
|
||||
um just a few security issues as you might
|
||||
|
|
@ -137,11 +137,11 @@ please let me know
|
|||
|
||||
0:01:56.320,0:01:59.179
|
||||
what I’m going to describe isn’t exactly what I do
|
||||
with general electric
|
||||
with General Electric
|
||||
|
||||
0:01:59.179,0:02:02.390
|
||||
or at least it's not officially what I do at general
|
||||
electric
|
||||
or at least it's not officially what I do at General
|
||||
Electric
|
||||
|
||||
0:02:02.390,0:02:06.950
|
||||
but you can imagine that I just don’t come up with
|
||||
|
|
@ -234,7 +234,7 @@ if you think about health well you might say
|
|||
how’s your blood pressure
|
||||
|
||||
0:03:25.719,0:03:27.940
|
||||
well it’s under one hundred and twenty over eighty
|
||||
well it’s under 120 over 80
|
||||
|
||||
0:03:27.940,0:03:29.659
|
||||
that's sort of one data point
|
||||
|
|
@ -393,13 +393,13 @@ have an earnings report appear on the network share or
|
|||
on a peer-to-peer network somewhere
|
||||
|
||||
0:05:22.669,0:05:25.949
|
||||
that's that's an ouput that means you had a failure somewhere
|
||||
that's an ouput that means you had a failure somewhere
|
||||
|
||||
0:05:25.949,0:05:28.069
|
||||
do you have a system or network that’s unavailable
|
||||
|
||||
0:05:28.069,0:05:29.720
|
||||
due to a Ddos attack
|
||||
due to a DDoS attack
|
||||
|
||||
0:05:29.720,0:05:31.060
|
||||
these are all outputs so
|
||||
|
|
@ -412,7 +412,7 @@ I really don't care so much about that I think
|
|||
these can influence these
|
||||
|
||||
0:05:36.459,0:05:40.539
|
||||
these are the things that I I care about
|
||||
these are the things that I care about
|
||||
|
||||
0:05:40.539,0:05:44.129
|
||||
and just to step a
|
||||
|
|
@ -442,8 +442,8 @@ developers here is that in the last talk there was
|
|||
lots of discussions about
|
||||
|
||||
0:06:01.030,0:06:05.289
|
||||
you made this change and you get a five percent difference
|
||||
or you made this change and you get a ten percent difference
|
||||
you made this change and you get a 5% difference
|
||||
or you made this change and you get a 10% difference
|
||||
|
||||
0:06:05.289,0:06:07.019
|
||||
none of that happens in security
|
||||
|
|
@ -606,7 +606,7 @@ and then you orient and you figure out well where am
|
|||
I in relation to where the bad guys are
|
||||
|
||||
0:07:57.409,0:08:02.359
|
||||
then you make a decision like okay is there’s a bad guy
|
||||
then you make a decision like okay there’s a bad guy
|
||||
I better roll over and shoot it down
|
||||
|
||||
0:08:02.359,0:08:04.269
|
||||
|
|
@ -663,7 +663,7 @@ so this is probably my favorite description
|
|||
of security period
|
||||
|
||||
0:08:45.120,0:08:49.830
|
||||
my aplogies to my European friends this
|
||||
my apologies to my European friends this
|
||||
is the football poll security
|
||||
|
||||
0:08:49.830,0:08:54.710
|
||||
|
|
@ -701,20 +701,20 @@ while meanwhile you could be completely all about
|
|||
something different
|
||||
|
||||
0:09:15.680,0:09:19.650
|
||||
and I first started thinking about this in 2000 2001
|
||||
and I first started thinking about this in 2000-2001
|
||||
|
||||
0:09:19.650,0:09:21.800
|
||||
where there were some guys in Finland
|
||||
|
||||
0:09:21.800,0:09:27.060
|
||||
who did this huge innumeration they were doing some of the
|
||||
who did this huge enumeration they were doing some of the
|
||||
first fuzzing work against SMTP
|
||||
|
||||
0:09:27.060,0:09:27.849
|
||||
it was called the
|
||||
it was called
|
||||
|
||||
0:09:27.849,0:09:29.000
|
||||
protos toolkit
|
||||
The Protos Toolkit
|
||||
|
||||
0:09:29.000,0:09:32.140
|
||||
and they did all this work in and they found that
|
||||
|
|
@ -779,7 +779,7 @@ paying attention to your own employees you’re violating
|
|||
their rights and their privacy
|
||||
|
||||
0:10:13.750,0:10:15.100
|
||||
and meanwhie you got like
|
||||
and meanwhile you got like
|
||||
|
||||
0:10:15.100,0:10:16.899
|
||||
Romanians and Russians and Chinese and
|
||||
|
|
@ -893,7 +893,7 @@ maybe you just have robots or something right don't they
|
|||
don’t complain
|
||||
|
||||
0:11:49.920,0:11:50.850
|
||||
So anwyay wow
|
||||
So anyway wow
|
||||
|
||||
0:11:50.850,0:11:51.909
|
||||
that came out of nowhere
|
||||
|
|
@ -974,13 +974,13 @@ the general process is I identify my trust boundaries
|
|||
I apply some instrumentation
|
||||
|
||||
0:12:41.280,0:12:43.620
|
||||
and then I collect analyse and escalate
|
||||
and then I collect analyze and escalate
|
||||
|
||||
0:12:43.620,0:12:46.000
|
||||
%uh collect meaning I get the information
|
||||
|
||||
0:12:46.000,0:12:48.420
|
||||
analyse I look at it figure out what it means
|
||||
analyze I look at it figure out what it means
|
||||
|
||||
0:12:48.420,0:12:48.889
|
||||
escalate
|
||||
|
|
@ -1125,7 +1125,7 @@ and it’s funny people have probably heard about building security in
|
|||
|
||||
0:14:38.570,0:14:42.620
|
||||
that's like trying to make things more secure
|
||||
have been trying to do that for like twenty years
|
||||
have been trying to do that for like 20 years
|
||||
|
||||
0:14:42.620,0:14:44.240
|
||||
it just doesn't work
|
||||
|
|
@ -1199,7 +1199,7 @@ closely with the guy does the cloudsecurity.org
|
|||
blog
|
||||
|
||||
0:15:40.870,0:15:44.800
|
||||
and %uh he's he's a fellow employee with
|
||||
and %uh he's a fellow employee with
|
||||
me is that we always considering this because
|
||||
|
||||
0:15:44.800,0:15:45.380
|
||||
|
|
@ -1218,7 +1218,7 @@ window to the cloud
|
|||
is an SSL encrypted pipe
|
||||
|
||||
0:15:53.530,0:15:58.430
|
||||
%um it doesn't help me too much to inpsect it at the
|
||||
%um it doesn't help me too much to inspect it at the
|
||||
network level right
|
||||
|
||||
0:15:58.430,0:16:00.129
|
||||
|
|
@ -1232,10 +1232,10 @@ oh boy that’s really happening
|
|||
|
||||
0:16:04.650,0:16:10.110
|
||||
try getting good logs out of any of the cloud buyers
|
||||
it is absolutely horrible they they don't
|
||||
it is absolutely horrible they don't
|
||||
|
||||
0:16:10.110,0:16:14.150
|
||||
they don't want to store them they don't want
|
||||
want to store them they don't want
|
||||
to provide you the data in any format that’s useful
|
||||
|
||||
0:16:14.150,0:16:17.710
|
||||
|
|
@ -1268,7 +1268,7 @@ and you know got control of some of our systems and
|
|||
so forth
|
||||
|
||||
0:16:36.600,0:16:38.400
|
||||
virtualisation is obviously an issue
|
||||
virtualization is obviously an issue
|
||||
|
||||
0:16:38.400,0:16:40.100
|
||||
%um if you think about
|
||||
|
|
@ -1318,7 +1318,7 @@ so
|
|||
I mean it could be
|
||||
|
||||
0:17:09.490,0:17:11.390
|
||||
somewhere else in the united states obviously but for
|
||||
somewhere else in the United States obviously but for
|
||||
|
||||
0:17:11.390,0:17:14.449
|
||||
the most part like if someone were to compromise
|
||||
|
|
@ -1512,10 +1512,10 @@ comes from
|
|||
the first network based IDS that taught
|
||||
|
||||
0:19:33.490,0:19:35.400
|
||||
he wrote it in UC Davis in ‘89
|
||||
he wrote it in UC Davis in 1989
|
||||
|
||||
0:19:35.400,0:19:39.520
|
||||
so this is wow that’s twenty years I feel
|
||||
so this is wow that’s 20 years I feel
|
||||
freaking old right now
|
||||
|
||||
0:19:39.520,0:19:39.979
|
||||
|
|
@ -1540,7 +1540,7 @@ is finally start to catch up with it
|
|||
|
||||
0:19:50.470,0:19:56.750
|
||||
and they call them network forensic appliances
|
||||
and they charge you fifty thousand dollars
|
||||
and they charge you 50,000 dollars
|
||||
|
||||
0:19:56.750,0:20:02.110
|
||||
for the enterprise that’s right
|
||||
|
|
@ -1578,7 +1578,7 @@ but we were doing this earlier
|
|||
so I learned from people who invented this stuff
|
||||
|
||||
0:20:27.480,0:20:30.779
|
||||
you know wow that's like fifteen years ago
|
||||
you know wow that's like 15 years ago
|
||||
|
||||
0:20:30.779,0:20:35.279
|
||||
alright so why network censors
|
||||
|
|
@ -1752,13 +1752,13 @@ because if you're a good admin
|
|||
you're not surfing
|
||||
|
||||
0:23:03.019,0:23:06.370
|
||||
MySpace on your Windows server
|
||||
MySpace on your Windows Server
|
||||
|
||||
0:23:06.370,0:23:08.070
|
||||
right well you’re not on a Windows server
|
||||
right well you’re not on a Windows Server
|
||||
|
||||
0:23:08.070,0:23:13.590
|
||||
but well you can admin on a Windows server
|
||||
but well you can admin on a Windows Server
|
||||
but you know what I mean
|
||||
|
||||
0:23:13.590,0:23:16.710
|
||||
|
|
@ -1872,7 +1872,7 @@ as opposed to
|
|||
what a user platform is telling me
|
||||
|
||||
0:24:35.180,0:24:35.980
|
||||
so if I’m
|
||||
so
|
||||
|
||||
0:24:35.980,0:24:37.799
|
||||
if I’m on a user platform
|
||||
|
|
@ -1897,7 +1897,7 @@ alright we have a problem here
|
|||
so this is why I like
|
||||
|
||||
0:24:51.120,0:24:54.020
|
||||
to itroduce these sorts of devices
|
||||
to introduce these sorts of devices
|
||||
|
||||
0:24:54.020,0:24:55.070
|
||||
let me talk a little bit
|
||||
|
|
@ -2075,7 +2075,7 @@ I don't run the one sytem I expose in my home lab
|
|||
is not an Intel system
|
||||
|
||||
0:27:04.310,0:27:06.940
|
||||
it's a Mac mini
|
||||
it's a Mac Mini
|
||||
|
||||
0:27:06.940,0:27:08.550
|
||||
and it’s running Debian on top
|
||||
|
|
@ -2348,7 +2348,7 @@ in fact there was one
|
|||
|
||||
0:31:06.470,0:31:11.210
|
||||
he did a concert once actually he didn't
|
||||
do a concert he attended somebody else’s concert
|
||||
do a concert he attended somebody's else concert
|
||||
|
||||
0:31:11.210,0:31:15.190
|
||||
and I don't know who it was like Johnny Cash or something
|
||||
|
|
@ -2419,8 +2419,8 @@ so that's the end of the line
|
|||
right at this point he’s got two options he can either ignore it
|
||||
|
||||
0:32:05.940,0:32:10.240
|
||||
or he can satisfy his fifteen minute SOA that his customer
|
||||
pays three thousand dollars a month
|
||||
or he can satisfy his 15 minute SOA that his customer
|
||||
pays $3,000 a month
|
||||
|
||||
0:32:10.240,0:32:10.860
|
||||
for
|
||||
|
|
@ -2543,10 +2543,10 @@ I’ll date myself but in 1998
|
|||
intruders in China
|
||||
|
||||
0:33:39.509,0:33:41.049
|
||||
who had writtten their own
|
||||
who had written their own
|
||||
|
||||
0:33:41.049,0:33:44.010
|
||||
virtualisation platform on top of Solaris
|
||||
virtualization platform on top of Solaris
|
||||
|
||||
0:33:44.010,0:33:46.159
|
||||
who were doing stuff we were like holy cow
|
||||
|
|
@ -2755,7 +2755,7 @@ my servers are in Maryland
|
|||
|
||||
0:36:20.819,0:36:23.099
|
||||
yes I’m an ISP what happens when I get stuff from
|
||||
Massachussetts or California and they’re going you can’t do that
|
||||
Massachusetts or California and they’re going you can’t do that
|
||||
|
||||
0:36:27.329,0:36:28.269
|
||||
yes okay so there’s two things
|
||||
|
|
@ -2855,7 +2855,7 @@ everything that I’ve shown here
|
|||
you could literally walk out of here
|
||||
|
||||
0:37:48.249,0:37:50.619
|
||||
go into the freeBSD ports tree find a SGUIL ports
|
||||
go into the FreeBSD ports tree find a SGUIL ports
|
||||
|
||||
0:37:52.119,0:37:54.840
|
||||
do your make I mean the ports are a little ugh
|
||||
|
|
@ -3029,7 +3029,7 @@ output of an ID command on Unix
|
|||
where the result was
|
||||
|
||||
0:40:14.779,0:40:16.179
|
||||
UID zero
|
||||
UID 0
|
||||
|
||||
0:40:16.179,0:40:19.529
|
||||
is that good or is that bad I mean you’d probably say that sounds bad
|
||||
|
|
@ -3271,7 +3271,7 @@ and secondly if he does
|
|||
|
||||
0:43:29.130,0:43:33.189
|
||||
can we release so we're trying to work
|
||||
out those I think it'll be resolved postively
|
||||
out those I think it'll be resolved positively
|
||||
|
||||
0:43:33.189,0:43:35.119
|
||||
because we're GE’s actually fairly pro-open-source
|
||||
|
|
@ -3456,10 +3456,10 @@ real Snort rules fades
|
|||
so whereas
|
||||
|
||||
0:46:24.309,0:46:26.510
|
||||
five years ago it might have been like ninety percent
|
||||
five years ago it might have been like 90%
|
||||
|
||||
0:46:26.510,0:46:28.619
|
||||
these days it's like twenty five percent
|
||||
these days it's like 25%
|
||||
|
||||
0:46:28.619,0:46:35.619
|
||||
so they probably can pull in a certain percentage
|
||||
|
|
@ -3496,8 +3496,8 @@ just what we can afford as far as hard drive spaces go
|
|||
my last budget
|
||||
|
||||
0:47:11.769,0:47:15.319
|
||||
I could only spend about twenty five hundred
|
||||
to three grand per sensor
|
||||
I could only spend about 2,500
|
||||
to 3,000 per sensor
|
||||
|
||||
0:47:15.319,0:47:18.949
|
||||
which limited me to about one to
|
||||
|
|
@ -3700,7 +3700,7 @@ and then you start investigating
|
|||
and the reason I do this approach is because it’s cheap
|
||||
|
||||
0:50:10.190,0:50:14.099
|
||||
you know twenty five hundred dollar commodity hardware
|
||||
you know twenty $500 commodity hardware
|
||||
open source software
|
||||
|
||||
0:50:14.099,0:50:15.820
|
||||
|
|
@ -3771,7 +3771,7 @@ put it that way
|
|||
as far as FreeBSD goes specifically
|
||||
|
||||
0:51:10.930,0:51:14.229
|
||||
there’s som like minor things that make my
|
||||
there’s some like minor things that make my
|
||||
life better
|
||||
|
||||
0:51:14.229,0:51:18.349
|
||||
|
|
@ -3814,7 +3814,7 @@ is opening up a BPF
|
|||
you can track performance with the what was it
|
||||
|
||||
0:51:40.109,0:51:41.609
|
||||
net stat dash B
|
||||
netstat -B
|
||||
|
||||
0:51:41.609,0:51:42.400
|
||||
capital B
|
||||
|
|
@ -4213,14 +4213,14 @@ and so finally I said this guy is all over the space he’s in
|
|||
California he's using the UUnet
|
||||
|
||||
0:57:35.449,0:57:38.170
|
||||
the Uunet blocker however they’re signing they’re signing
|
||||
the UUnet blocker however they’re signing they’re signing
|
||||
the IPs
|
||||
|
||||
0:57:38.170,0:57:41.390
|
||||
it's just all over the place we're blocking Uunet
|
||||
it's just all over the place we're blocking UUnet
|
||||
|
||||
0:57:41.390,0:57:43.799
|
||||
all of Uunet to the air force
|
||||
all of UUnet to the air force
|
||||
|
||||
0:57:43.799,0:57:44.790
|
||||
so
|
||||
|
|
@ -4343,7 +4343,7 @@ honey pots are things that are good to run if
|
|||
one you’re researcher or two you have a lot of time on your hands
|
||||
|
||||
0:59:32.119,0:59:36.039
|
||||
because I have like a network of three hundred thousand
|
||||
because I have like a network of 300,000
|
||||
honey pots
|
||||
|
||||
0:59:36.039,0:59:38.479
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue