﻿WEBVTT

1
00:00:00.110 --> 00:00:03.260
<v ->Hi, I'm Amanda Rousseau aka @malwareunicorn</v>

2
00:00:03.260 --> 00:00:05.140
and I'm an offensive security engineer

3
00:00:05.140 --> 00:00:06.749
and this is Hacking Support.

4
00:00:06.749 --> 00:00:08.255
[dramatic music]

5
00:00:08.255 --> 00:00:10.980
[keyboard clicking]
[dramatic music]

6
00:00:10.980 --> 00:00:12.937
This Twitter user, @cloud_opinion, asks,

7
00:00:12.937 --> 00:00:14.657
"At this point, hackers know everything

8
00:00:14.657 --> 00:00:16.717
"there is to know about every one of us.

9
00:00:16.717 --> 00:00:19.010
"Why do we need passwords now?"

10
00:00:19.010 --> 00:00:21.420
Why keep going to the gym if you're gonna die anyways?

11
00:00:21.420 --> 00:00:23.390
Passwords are kind of a necessary evil.

12
00:00:23.390 --> 00:00:25.490
And hackers really don't know everything about you.

13
00:00:25.490 --> 00:00:27.180
It all depends if you put that

14
00:00:27.180 --> 00:00:28.887
information out there on the internet.

15
00:00:28.887 --> 00:00:29.720
"Congrats.

16
00:00:29.720 --> 00:00:32.217
"I know what a white hat is, I know what a black hat is.

17
00:00:32.217 --> 00:00:33.467
"What is a red hat?

18
00:00:33.467 --> 00:00:34.450
"Angry hacker?"

19
00:00:34.450 --> 00:00:37.490
I don't think I've heard the term red hat hacker before.

20
00:00:37.490 --> 00:00:40.470
When you're a white hat hacker, you hack for good.

21
00:00:40.470 --> 00:00:42.110
A lotta people in the security industry

22
00:00:42.110 --> 00:00:43.710
are white hat hackers.

23
00:00:43.710 --> 00:00:47.750
And then, for the cyber-criminals, we call them black hats.

24
00:00:47.750 --> 00:00:50.460
There's also this other term called a gray hat

25
00:00:50.460 --> 00:00:53.640
where they could be a IT admin during the day

26
00:00:53.640 --> 00:00:56.480
while moonlight as a black hat during the night.

27
00:00:56.480 --> 00:00:57.313
[mouse clicking]

28
00:00:57.313 --> 00:01:00.267
@hacker4life asks, "@malwareunicorn, how do you even begin

29
00:01:00.267 --> 00:01:02.307
"learning and exceeding in this field?

30
00:01:02.307 --> 00:01:03.999
"I'm trying to become a

31
00:01:03.999 --> 00:01:05.470
"penetration tester and need inspiration."

32
00:01:05.470 --> 00:01:08.960
So, a pen tester is kind of like an attacker

33
00:01:08.960 --> 00:01:12.319
that goes and checks all of the external ports,

34
00:01:12.319 --> 00:01:14.770
any openings within someone's network.

35
00:01:14.770 --> 00:01:17.420
But if you really wanna be a penetration tester,

36
00:01:17.420 --> 00:01:19.840
there's a lot of content out on the web right now.

37
00:01:19.840 --> 00:01:23.870
Courses, workshops, they even have events and conferences

38
00:01:23.870 --> 00:01:25.750
where you can meet other people in the field.

39
00:01:25.750 --> 00:01:28.100
You can find a mentor, learn from them.

40
00:01:28.100 --> 00:01:30.240
They would point you in the right direction.

41
00:01:30.240 --> 00:01:35.240
I feel like the hacker culture is pretty open and diverse,

42
00:01:35.460 --> 00:01:37.234
so there's a lotta content out there.

43
00:01:37.234 --> 00:01:38.067
[mouse clicking]

44
00:01:38.067 --> 00:01:38.900
"Malware's the worst.

45
00:01:38.900 --> 00:01:40.860
"What is its purpose other than wasting my time?"

46
00:01:40.860 --> 00:01:42.800
Usually, malware is going after money.

47
00:01:42.800 --> 00:01:45.260
And, if anything, you're considered collateral damage.

48
00:01:45.260 --> 00:01:48.190
When malware is delivered, they're usually

49
00:01:48.190 --> 00:01:51.530
just spraying all the malware to many people as possible,

50
00:01:51.530 --> 00:01:53.550
so it may not be intended for you.

51
00:01:53.550 --> 00:01:55.810
I think of malware as a fashion trend.

52
00:01:55.810 --> 00:01:56.930
You know, there's different malware

53
00:01:56.930 --> 00:01:58.790
every season, every quarter, and you have to

54
00:01:58.790 --> 00:02:01.430
stay in fashion and on trend all the time.

55
00:02:01.430 --> 00:02:02.960
When you think about older malware

56
00:02:02.960 --> 00:02:04.780
that used to occur a couple years ago,

57
00:02:04.780 --> 00:02:06.493
sometimes it comes back in fashion.

58
00:02:06.493 --> 00:02:07.326
[mouse clicking]

59
00:02:07.326 --> 00:02:08.247
This twitter user, @naima, asks,

60
00:02:08.247 --> 00:02:10.907
"Jessica Alba is an interesting choice for hacking.

61
00:02:10.907 --> 00:02:13.490
"How do hackers decide who they're going to target?"

62
00:02:13.490 --> 00:02:16.310
Jessica Alba's a beautiful woman and she's also a celebrity,

63
00:02:16.310 --> 00:02:19.070
so she sounds like a great, shiny object

64
00:02:19.070 --> 00:02:20.970
for cyber-criminals to go after,

65
00:02:20.970 --> 00:02:22.990
but a lot of them have different motivations.

66
00:02:22.990 --> 00:02:25.840
It could include money, is probably the biggest one.

67
00:02:25.840 --> 00:02:28.190
Another one would be reputation.

68
00:02:28.190 --> 00:02:29.910
They would be like, "Ha ha, I hacked this person."

69
00:02:29.910 --> 00:02:33.220
It could be information, kind of like corporate espionage,

70
00:02:33.220 --> 00:02:35.900
and then we have destruction, which is kind of rare.

71
00:02:35.900 --> 00:02:37.600
Basically what it is, they try to destroy

72
00:02:37.600 --> 00:02:39.803
all the systems to put that company out of business.

73
00:02:39.803 --> 00:02:40.636
[mouse clicking]

74
00:02:40.636 --> 00:02:43.527
@KyleeMinaj asks, "Why do they make the login process

75
00:02:43.527 --> 00:02:46.117
"for your student loan aid so difficult and tedious?

76
00:02:46.117 --> 00:02:48.227
"If some hackers want to break into my account

77
00:02:48.227 --> 00:02:50.177
"and pay off all my student loans,

78
00:02:50.177 --> 00:02:52.037
"please don't make it difficult for them.

79
00:02:52.037 --> 00:02:53.567
"Y'all are gonna ruin this for me.

80
00:02:53.567 --> 00:02:55.330
"Let them run wild in there."

81
00:02:55.330 --> 00:02:59.810
Kylee, these hackers are not gonna go and pay off your debt.

82
00:02:59.810 --> 00:03:01.220
If anything, they're gonna go

83
00:03:01.220 --> 00:03:03.220
into the system to pay off their tuition,

84
00:03:03.220 --> 00:03:05.360
so a lot of these controls are in place

85
00:03:05.360 --> 00:03:09.010
to hinder hackers like that to get into your account.

86
00:03:09.010 --> 00:03:10.510
It's an unfortunate thing to do

87
00:03:10.510 --> 00:03:12.181
but, you know, it's necessary.

88
00:03:12.181 --> 00:03:13.014
[mouse clicking]

89
00:03:13.014 --> 00:03:14.827
@AxelBlazen asks, "Speaking of [beep],

90
00:03:14.827 --> 00:03:16.757
"what is even the point of these bot accounts

91
00:03:16.757 --> 00:03:18.627
"that follow you but, well, that's it.

92
00:03:18.627 --> 00:03:21.927
"No messaging or anything, no spam, just follow.

93
00:03:21.927 --> 00:03:23.420
"Like [beep] sake, it's dumb."

94
00:03:23.420 --> 00:03:25.910
Well, these accounts are doing something

95
00:03:25.910 --> 00:03:30.900
that may not pertain to you, what we call account aging.

96
00:03:30.900 --> 00:03:32.700
So what that means is they're trying to

97
00:03:32.700 --> 00:03:36.070
bypass a lot of automated detections from social media

98
00:03:36.070 --> 00:03:40.050
that they have in place to look for fake accounts.

99
00:03:40.050 --> 00:03:42.370
And so, by tweeting or messaging

100
00:03:42.370 --> 00:03:44.520
or making any type of action,

101
00:03:44.520 --> 00:03:46.120
they're trying to bypass detection

102
00:03:46.120 --> 00:03:48.339
to look more like a legitimate account.

103
00:03:48.339 --> 00:03:49.172
[mouse clicking]

104
00:03:49.172 --> 00:03:50.287
This Twitter user, @andrewcheeky, asks,

105
00:03:50.287 --> 00:03:51.527
"What will they think of next?

106
00:03:51.527 --> 00:03:54.177
"Is there anything that has been corded in the last decade

107
00:03:54.177 --> 00:03:55.397
"that hackers haven't found

108
00:03:55.397 --> 00:03:57.340
"a vulnerability to do some damage?"

109
00:03:57.340 --> 00:03:59.010
If you think about your fridge at home

110
00:03:59.010 --> 00:04:02.670
being able to connect to the WiFi or your pressure cooker

111
00:04:02.670 --> 00:04:04.970
being able to connect to an app on your phone,

112
00:04:04.970 --> 00:04:07.320
a lot of these devices are developed

113
00:04:07.320 --> 00:04:09.200
in a way where they're looking for

114
00:04:09.200 --> 00:04:12.820
the lowest possible cost of manufacturing,

115
00:04:12.820 --> 00:04:14.730
so when they get to the security part,

116
00:04:14.730 --> 00:04:16.440
it's kind of like an afterthought,

117
00:04:16.440 --> 00:04:18.220
so until things change, we're gonna

118
00:04:18.220 --> 00:04:21.019
still have these problems with IoT devices.

119
00:04:21.019 --> 00:04:21.852
[mouse clicking]

120
00:04:21.852 --> 00:04:24.975
Twitter user @sifbaksh: "@malwareunicorn,

121
00:04:24.975 --> 00:04:26.087
"what should my first step be in debugging?

122
00:04:26.087 --> 00:04:28.860
"Should I just get a file and a book and start doing?"

123
00:04:28.860 --> 00:04:30.930
The best way is to just jump right in.

124
00:04:30.930 --> 00:04:33.170
Think about it as riding a bike.

125
00:04:33.170 --> 00:04:35.090
It takes time, it takes practice,

126
00:04:35.090 --> 00:04:36.320
but eventually, you'll get it.

127
00:04:36.320 --> 00:04:39.400
There's a different debugger for every operating system

128
00:04:39.400 --> 00:04:42.750
but they're not easy to learn unless you start, you know,

129
00:04:42.750 --> 00:04:46.420
just doing it yourself and training yourself and practicing.

130
00:04:46.420 --> 00:04:48.820
Like, I don't remember every single command in a debugger.

131
00:04:48.820 --> 00:04:50.263
I have to use a cheat sheet.

132
00:04:50.263 --> 00:04:51.096
[mouse clicking]

133
00:04:51.096 --> 00:04:53.267
Twitter user @stormwuff_: "My awesome boss says that

134
00:04:53.267 --> 00:04:55.337
"I can request to change my job title

135
00:04:55.337 --> 00:04:56.507
"to whatever I want it to be

136
00:04:56.507 --> 00:04:59.107
"in our company profile [obviously safe for work].

137
00:04:59.107 --> 00:05:00.587
"Could anything random like

138
00:05:00.587 --> 00:05:03.007
"Pokemon Hacker or Cybersecurity Wizard.

139
00:05:03.007 --> 00:05:04.470
"What do you guys think it should be?"

140
00:05:04.470 --> 00:05:08.100
Well, I can see you just said, "Obviously safe for work,"

141
00:05:08.100 --> 00:05:10.810
so I think you should just name yourself Safe for Work.

142
00:05:10.810 --> 00:05:11.650
[mouse clicking]

143
00:05:11.650 --> 00:05:14.897
This Twitter user, @SuB8u, asks, "Your smart TV

144
00:05:14.897 --> 00:05:17.227
"and your video streaming apps are collecting and sharing

145
00:05:17.227 --> 00:05:19.367
"tons of data, just because they can.

146
00:05:19.367 --> 00:05:21.827
"How long before we can start having embedded cameras

147
00:05:21.827 --> 00:05:24.070
"that malware triggers surreptitiously?"

148
00:05:24.070 --> 00:05:26.090
I have unfortunate news for you.

149
00:05:26.090 --> 00:05:28.220
This has been happening minus six years

150
00:05:28.220 --> 00:05:31.366
and it's gonna continue to happen, so too late for you."

151
00:05:31.366 --> 00:05:32.517
[mouse clicking]

152
00:05:32.517 --> 00:05:37.517
@Alessan82718685, that's a mouthful: "Why do you hate C#?"

153
00:05:38.480 --> 00:05:40.930
Man, his handle looks like a bot. [laughs]

154
00:05:40.930 --> 00:05:43.620
I don't hate C#, C# hates me.

155
00:05:43.620 --> 00:05:44.453
[mouse clicking]

156
00:05:44.453 --> 00:05:47.847
@theonlyoneofyou asks, "Why can't hackers do anything useful

157
00:05:47.847 --> 00:05:50.997
"like leak Taylor's recordings of Babe and Better Man?

158
00:05:50.997 --> 00:05:52.140
"Grow up, hackers."

159
00:05:52.140 --> 00:05:54.740
Well, if you don't already know, Taylor Swift has

160
00:05:54.740 --> 00:05:57.571
an alter ego that we call @SwiftOnSecurity

161
00:05:57.571 --> 00:05:59.100
and she's considered a security pro

162
00:05:59.100 --> 00:06:01.520
in the cybersecurity industry,

163
00:06:01.520 --> 00:06:03.800
so no one actually wants to hack her.

164
00:06:03.800 --> 00:06:05.480
But if you're in the know and you know

165
00:06:05.480 --> 00:06:07.232
who that is, then you know who it is.

166
00:06:07.232 --> 00:06:08.065
[mouse clicking]

167
00:06:08.065 --> 00:06:10.077
This Twitter user, @zer0wn asks, "Can we stop calling

168
00:06:10.077 --> 00:06:12.297
"people who DDoS [beep] hackers?

169
00:06:12.297 --> 00:06:13.597
"Journos, why the hell do you even

170
00:06:13.597 --> 00:06:15.317
"call them hackers to begin with?

171
00:06:15.317 --> 00:06:18.380
"Looking for legitimate answers as I am confused as hell."

172
00:06:18.380 --> 00:06:19.740
Well, let me set the record straight.

173
00:06:19.740 --> 00:06:23.040
There's a difference between hacker and a cyber-criminal,

174
00:06:23.040 --> 00:06:25.300
so if we were to refer to the bad guys,

175
00:06:25.300 --> 00:06:28.800
I would rather prefer to call them a cyber-criminal.

176
00:06:28.800 --> 00:06:30.570
There's a lotta people in the security industry

177
00:06:30.570 --> 00:06:32.140
that consider themselves hackers.

178
00:06:32.140 --> 00:06:33.817
There's a lotta people that hack for good.

179
00:06:33.817 --> 00:06:36.707
@WMRamadan asks, "@malwareunicorn,

180
00:06:36.707 --> 00:06:38.957
"I have a simple yet daunting question.

181
00:06:38.957 --> 00:06:41.587
"Why do you use a Mac for your security work?

182
00:06:41.587 --> 00:06:43.187
"I mean, a lot of people argue the fact

183
00:06:43.187 --> 00:06:45.800
"that Linux is the way to go in terms of security."

184
00:06:45.800 --> 00:06:47.430
Mac is similar to Linux.

185
00:06:47.430 --> 00:06:50.260
Think about two different brands of cars.

186
00:06:50.260 --> 00:06:51.780
They look different on the outside

187
00:06:51.780 --> 00:06:54.680
but they could be sharing the same chassis underneath.

188
00:06:54.680 --> 00:06:58.480
There's not a lotta malware out there for Mac and Linux.

189
00:06:58.480 --> 00:07:00.200
I mean, it's there, but, you know,

190
00:07:00.200 --> 00:07:02.912
currently most of the malware is on Windows.

191
00:07:02.912 --> 00:07:03.745
[mouse clicking]

192
00:07:03.745 --> 00:07:05.987
The Bishop, or @JoshHarris25:

193
00:07:05.987 --> 00:07:07.547
"What is the point of spam emails?

194
00:07:07.547 --> 00:07:08.797
"Are they profiting from it?

195
00:07:08.797 --> 00:07:11.910
"What do they gain from spending random unnecessary emails?"

196
00:07:11.910 --> 00:07:14.780
When people send out spam emails,

197
00:07:14.780 --> 00:07:17.580
they're sending it to thousands and thousands of targets.

198
00:07:17.580 --> 00:07:21.390
Say you had a million emails sent out

199
00:07:21.390 --> 00:07:23.498
and they're requesting $1.

200
00:07:23.498 --> 00:07:24.980
These cyber-criminals are expecting

201
00:07:24.980 --> 00:07:27.120
that 1% will actually bite.

202
00:07:27.120 --> 00:07:30.780
A lotta these cyber-criminals will treat this as a business,

203
00:07:30.780 --> 00:07:32.447
so it becomes very lucrative for them.

204
00:07:32.447 --> 00:07:34.613
@Cybor_Tooth: "@malwareunicorn, if you were to

205
00:07:34.613 --> 00:07:38.377
"create a timeline for an incident, what would it look like?

206
00:07:38.377 --> 00:07:41.280
"Just curious because your design skills are cray cray."

207
00:07:41.280 --> 00:07:42.790
Well, a lotta people don't know this,

208
00:07:42.790 --> 00:07:45.180
but before I got into computer science,

209
00:07:45.180 --> 00:07:47.950
I was actually pursuing a degree in graphic design,

210
00:07:47.950 --> 00:07:51.110
so a lot of it, from my time doing that,

211
00:07:51.110 --> 00:07:52.540
carries over into my work.

212
00:07:52.540 --> 00:07:54.920
Back when I used to work at the Department of Defense,

213
00:07:54.920 --> 00:07:57.420
I used to create these 3D videos

214
00:07:57.420 --> 00:08:00.350
to describe different type of network layouts.

215
00:08:00.350 --> 00:08:02.410
I didn't know 3D design at the time,

216
00:08:02.410 --> 00:08:05.150
so I spent a weekend, taught myself,

217
00:08:05.150 --> 00:08:08.140
and the next day, started, you know, making content.

218
00:08:08.140 --> 00:08:11.190
If you can make things look nice and be able to

219
00:08:11.190 --> 00:08:15.076
communicate the actual abstract content, it helps.

220
00:08:15.076 --> 00:08:15.909
[mouse clicking]

221
00:08:15.909 --> 00:08:18.417
@dontlook asked, "Yeah, but bad pick up lines

222
00:08:18.417 --> 00:08:20.497
"and phishing really any different?

223
00:08:20.497 --> 00:08:23.840
"Low effort, easy reuse, and rarely do you get a success."

224
00:08:23.840 --> 00:08:26.120
I really think phishing is more effective

225
00:08:26.120 --> 00:08:28.419
than saying a pickup line.

226
00:08:28.419 --> 00:08:33.327
@ivladdalvi: "I studied WannaCry case in NHS hospital.

227
00:08:33.327 --> 00:08:35.727
"A disaster seemed totally preventable.

228
00:08:35.727 --> 00:08:36.677
"Why didn't they patch?

229
00:08:36.677 --> 00:08:38.420
"Were they lazy? Stupid?"

230
00:08:38.420 --> 00:08:41.460
In the case of this incident, a hospital

231
00:08:41.460 --> 00:08:44.320
in the UK was under a ransomware attack.

232
00:08:44.320 --> 00:08:45.810
It happened because they didn't

233
00:08:45.810 --> 00:08:48.300
upgrade their servers or their computers.

234
00:08:48.300 --> 00:08:49.710
And this is the whole reason

235
00:08:49.710 --> 00:08:52.200
why upgrading is really important,

236
00:08:52.200 --> 00:08:55.110
but when you think about it, some of these infrastructures

237
00:08:55.110 --> 00:08:58.530
like a hospital or a power plant,

238
00:08:58.530 --> 00:09:01.630
a lot of 'em cannot experience any downtime.

239
00:09:01.630 --> 00:09:03.870
So when you do do an upgrade, you have to

240
00:09:03.870 --> 00:09:05.781
shut down the systems for a little while.

241
00:09:05.781 --> 00:09:06.614
[mouse clicking]

242
00:09:06.614 --> 00:09:09.757
@Tyro733 asks, "As someone who doesn't work in Infosec,

243
00:09:09.757 --> 00:09:11.527
"what are red and blue team?

244
00:09:11.527 --> 00:09:13.880
"I'm assuming red are the pen testers."

245
00:09:13.880 --> 00:09:17.090
These terms actually come from the military

246
00:09:17.090 --> 00:09:19.840
where they would perform military operations,

247
00:09:19.840 --> 00:09:23.260
they have a team that acts as a red team doing the attacks

248
00:09:23.260 --> 00:09:25.850
and the blue team serves as the defense team.

249
00:09:25.850 --> 00:09:28.770
Similar to what we have in cybersecurity in that

250
00:09:28.770 --> 00:09:33.330
the red team is hacking the blue team's systems.

251
00:09:33.330 --> 00:09:35.160
The whole point of what the red team does

252
00:09:35.160 --> 00:09:37.980
is to enumerate holes within a network.

253
00:09:37.980 --> 00:09:40.940
We wanna find the holes before the bad actors do.

254
00:09:40.940 --> 00:09:43.000
Think of it like we're sparring partners.

255
00:09:43.000 --> 00:09:45.650
So, we're really not there to antagonize the blue team

256
00:09:45.650 --> 00:09:47.450
or anything like that, we really wanna

257
00:09:47.450 --> 00:09:49.100
work together with the blue team.

258
00:09:49.100 --> 00:09:49.933
[mouse clicking]

259
00:09:49.933 --> 00:09:52.247
@r00tzasylum: "Hacker kid interviewed his mom

260
00:09:52.247 --> 00:09:54.517
"about what it's like to build a career in Infosec.

261
00:09:54.517 --> 00:09:56.867
"Something @defcon parents often think about:

262
00:09:56.867 --> 00:09:59.187
"how do we inspire kids to go into this space

263
00:09:59.187 --> 00:10:02.170
"and see it for the fun and challenge that it is?"

264
00:10:02.170 --> 00:10:04.160
Well, when I was young, I had no idea

265
00:10:04.160 --> 00:10:05.280
I was gonna be in this job.

266
00:10:05.280 --> 00:10:07.620
I actually had to know that this job existed

267
00:10:07.620 --> 00:10:09.080
in order to actually go into it.

268
00:10:09.080 --> 00:10:11.820
If there was a chance that, at a career fair,

269
00:10:11.820 --> 00:10:15.800
you would have someone who gets to hack for living,

270
00:10:15.800 --> 00:10:18.200
I think that would be a really cool thing to have.

271
00:10:18.200 --> 00:10:19.360
You have to have the correct

272
00:10:19.360 --> 00:10:21.430
mentality to be in this industry.

273
00:10:21.430 --> 00:10:23.690
The whole hacker mentality is

274
00:10:23.690 --> 00:10:25.630
creatively thinking outside the box,

275
00:10:25.630 --> 00:10:28.100
solving a problem that's out of the standards

276
00:10:28.100 --> 00:10:30.610
or norms of how it's supposed to execute.

277
00:10:30.610 --> 00:10:33.730
If we kind of use that type of mentality

278
00:10:33.730 --> 00:10:36.920
in some of the content or workshops

279
00:10:36.920 --> 00:10:40.630
or anything that we reach out to these kids with,

280
00:10:40.630 --> 00:10:42.540
it'll kind of inspire them to

281
00:10:42.540 --> 00:10:44.536
wanna solve problems in this field.

282
00:10:44.536 --> 00:10:45.369
[mouse clicking]

283
00:10:45.369 --> 00:10:46.547
This Twitter user, @Arfness, asks,

284
00:10:46.547 --> 00:10:47.917
"Why do stock image hackers

285
00:10:47.917 --> 00:10:50.240
"exclusively wear ski masks and hoodies?"

286
00:10:50.240 --> 00:10:52.100
Well, I think the photographer was going for

287
00:10:52.100 --> 00:10:54.680
a feel of an actual robber or a criminal,

288
00:10:54.680 --> 00:10:57.210
but there is a reason to wear something on your face.

289
00:10:57.210 --> 00:10:58.350
They're trying to hide their face

290
00:10:58.350 --> 00:11:00.750
from cameras or any type of identifier

291
00:11:00.750 --> 00:11:02.440
that will attribute them to a crime.

292
00:11:02.440 --> 00:11:03.700
And why they're wearing hoodies,

293
00:11:03.700 --> 00:11:06.690
I can imagine that some of these server rooms are super cold

294
00:11:06.690 --> 00:11:07.851
and they need to cover their ears.

295
00:11:07.851 --> 00:11:08.684
[mouse clicking]

296
00:11:08.684 --> 00:11:10.110
If you don't already know, you know,

297
00:11:10.110 --> 00:11:12.220
some of us actually dress like this to work

298
00:11:12.220 --> 00:11:15.690
and I actually have a ski mask for all of my outfits.

299
00:11:15.690 --> 00:11:17.540
Lemme put it on for you guys.

300
00:11:17.540 --> 00:11:20.053
And it's not complete without the glasses.

301
00:11:21.080 --> 00:11:22.665
We're good to go, it's time to hack.

302
00:11:22.665 --> 00:11:23.730
[keyboard clicking]

303
00:11:23.730 --> 00:11:26.440
This has been Hacking Support with Amanda Rousseau.

304
00:11:26.440 --> 00:11:27.973
You guys stay safe out there.

305
00:11:27.973 --> 00:11:28.815
[dramatic music]

