Mike Ritland
๐ค SpeakerAppearances Over Time
Podcast Appearances
I mean, possibly. I don't know that level of detail and don't really want to, but as long as they're part of the okay entities.
I mean, possibly. I don't know that level of detail and don't really want to, but as long as they're part of the okay entities.
I mean, possibly. I don't know that level of detail and don't really want to, but as long as they're part of the okay entities.
Yeah, I know exactly right.
Yeah, I know exactly right.
Yeah, I know exactly right.
This is going to be defined on who is or isn't going to put me in prison. So that's my definition of good in this scenario is keeping those people happy. But to be clear, there's another advantage here, which is some of these places are critical infrastructure that they work at or are tasked with. securing or improving the security. So we all benefit from that.
This is going to be defined on who is or isn't going to put me in prison. So that's my definition of good in this scenario is keeping those people happy. But to be clear, there's another advantage here, which is some of these places are critical infrastructure that they work at or are tasked with. securing or improving the security. So we all benefit from that.
This is going to be defined on who is or isn't going to put me in prison. So that's my definition of good in this scenario is keeping those people happy. But to be clear, there's another advantage here, which is some of these places are critical infrastructure that they work at or are tasked with. securing or improving the security. So we all benefit from that.
I don't want a place that has some form of nuclear material in it getting compromised because the people who want to compromise those places probably looking to hurt me in some way, right? So let's help them. So the other feature kind of added to these cables recently is we call it HIDX Stealth Link.
I don't want a place that has some form of nuclear material in it getting compromised because the people who want to compromise those places probably looking to hurt me in some way, right? So let's help them. So the other feature kind of added to these cables recently is we call it HIDX Stealth Link.
I don't want a place that has some form of nuclear material in it getting compromised because the people who want to compromise those places probably looking to hurt me in some way, right? So let's help them. So the other feature kind of added to these cables recently is we call it HIDX Stealth Link.
It's kind of the branding of it to explain what it is, but ultimately still acting as a keyboard, but now it's got bidirectional data transfer. So like a network interface, but without ever showing as a network interface, you can send data back and forth between the computer, and it just looks like a keyboard to the target system.
It's kind of the branding of it to explain what it is, but ultimately still acting as a keyboard, but now it's got bidirectional data transfer. So like a network interface, but without ever showing as a network interface, you can send data back and forth between the computer, and it just looks like a keyboard to the target system.
It's kind of the branding of it to explain what it is, but ultimately still acting as a keyboard, but now it's got bidirectional data transfer. So like a network interface, but without ever showing as a network interface, you can send data back and forth between the computer, and it just looks like a keyboard to the target system.
This was used by quite a few people in a lot of environments, but in this case, the critical infrastructure was not looking for this type of exfiltration technique. And it worked really well, got them in, and they achieved their objectives with this critical infrastructure and got it fixed. I was told that my name got put into a report that I will never have access to, but that's extremely cool.
This was used by quite a few people in a lot of environments, but in this case, the critical infrastructure was not looking for this type of exfiltration technique. And it worked really well, got them in, and they achieved their objectives with this critical infrastructure and got it fixed. I was told that my name got put into a report that I will never have access to, but that's extremely cool.
This was used by quite a few people in a lot of environments, but in this case, the critical infrastructure was not looking for this type of exfiltration technique. And it worked really well, got them in, and they achieved their objectives with this critical infrastructure and got it fixed. I was told that my name got put into a report that I will never have access to, but that's extremely cool.
It's like, cool, I got my name into a report to fix some critical infrastructure with a technique that we developed with my team. And honestly, I'd love to pause and even talk about that team because... while I make the hardware and the manufacturing and run the business, all the tricks this does heavily about the actual firmware that runs on this and that requires multiple people to pull off.
It's like, cool, I got my name into a report to fix some critical infrastructure with a technique that we developed with my team. And honestly, I'd love to pause and even talk about that team because... while I make the hardware and the manufacturing and run the business, all the tricks this does heavily about the actual firmware that runs on this and that requires multiple people to pull off.