Hacker saves the world. Teaches you hacking.

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
- [Marcus] Have you ever found yourself wondering how it is that hackers get into company networks? Well, I'm gonna show you one of the simple, but very common techniques. You're probably familiar with Microsoft Word, but did you know Microsoft Word document can run code? For example, I wrote one here that will just open a message box saying, you've been hacked. And you might notice I had to click enable content to run the code. So how would we get a user to do this? Set a nice Microsoft blue background. I'm gonna add the Windows security logo, and then I'm gonna make a convincing message telling the user they need to click the button. I'll add a screenshot as well just for example. Final product looks fairly convincing, so now it's time for some real malicious code. For my example, I'm using a PowerShell script. They'll download and run some malware, it'll give me full access to the computer. In the real world, we'd probably disguise this as an email containing a financial invoice so that they would download and open the document. For demonstration purposes, the system on the left is the company computer and the system on the right is the hacker. I'm using reverse (indistinct) software so that the company computer will connect to mine, that way we don't have to worry about the firewall. Moment of truth, let's click enable content. As you can see from the window flash, that our malware has ran and it's now connected to the hacker's system. We basically have full control over the company computer. We can see whatever's on the screen and even move windows around like so. This is actually one of the most common ways hackers get into company systems. So if you see that enable content warning, don't click it. - Hi everyone. David Bombal back with a very special guest. Marcus, welcome. - Hello, it's great to be on here. - On TikTok, I've seen you've answered a lot of questions. What are some of the, like, the craziest questions that you've got? And like, I see you do these response videos. I like the one that you did with the Airbnb. - [Marcus] So here's how to spot hidden cameras in an Airbnb or hotel. Now, the first thing you're gonna wanna look for is devices that are conveniently placed where a creeper would want to look. Take this fire alarm for instance. It's placed right above the bed. Now, one way to see if a device is a camera is to shine a bright light at it. If you hit a camera lens, it's gonna give a bluish reflection. Now you can test this by shining a light at your phone and seeing how the camera looks when placed under a flashlight. Now this clock is mirrored, but if we shine a bright light at it, we can see through the glass and see there's a camera there. Now this technique can also work on two-way mirrors. So the camera is USB powered and the wall charger it's plugged into is actually also a camera. If we shine the light on it, you can see that little pinhole in the middle with the blue reflection, that is the camera lens. Night vision cameras use infrared LEDs to see, and if we turn off the lights and use the front facing phone camera, we can actually see these LEDs. Now the front facing camera is the only one that tends to work 'cause the back facing one has an IR filter. Now you can sort of see the infrared LEDs on this clock already, but if we cover up the main LED, we can actually see them a lot better. Now I wouldn't rely on this method because people usually don't shower in the dark. So if they're placing cameras in the bathroom, then they're probably not gonna bother with night vision. So these camera lenses are very small as you can see here. So they can be hidden in anything, even a hole in the wall. - So can you just explain what you did there? (David laughing) - I'm gonna be honest here. I absolutely hate that video. It was like- Well, you got like 30 million views or something. - I know, that's why I hate it. (David laughing) So it was a kooky like kind of question. How do I find hidden cameras in my Airbnb? And I was like, yeah, there are news articles about this. It does happen. It's very, very rare. It's kind of like, how do I stop sharks from attacking me in the ocean? It's like, you can stop sharks from attacking you in the ocean, it's not a real risk that's very common, but hey, I'll show you how to stop the shark attacks. And it was kind of a video like that. I didn't expect it to blow up. And then, of course, like it gets 35 million views, people are like going crazy tearing apart their Airbnbs and I'm just like, oh, no. (both laughing) Like this stupid video I made just because someone asked has become like this, like worldwide phenomenon, like it was like in like major news sites. I was getting interview requests from like the New York Times and all of that. And I just- [David] Because of that video? - Yeah. Well, not to interview me, they were specifically wanting to interview about the video that was pretty much every major news outlet I can think of wanted me to say something about that video, and I just like, I wish I could unmake. (both laughing) - I'm just laughing. Sorry, I have to laugh about this. This is like the second time I think I've heard you say that you didn't like the limelight or the spotlight of the news organization on you, yeah? - Yeah, I'm just not good with publicity. Like I'm getting more comfortable with it now, but when it's like the whole, like, the thing is blowing up, you have all of the media just like sliding into your DMs, everyone wants to hear about it. It's very overwhelming. - I think it's quite funny and ironic in a way. You saved the world from WannaCry. (David chuckling) And your next big stunt was to use a phone to find cameras in an Airbnb. - I know. I feel like both of those things were like equally as useless. Like the WannaCry thing had very big implications, but like at the very core, it was like one of my least technical feats. And then again with the Airbnb, like this was just like a silly video I did, and it wasn't like some huge technical feat that took like months to work on. And I think this is like the theme for my life is doing like minimally technical things and then somehow becoming famous for them. - It's funny 'cause I heard Jack of Darknet Diaries and he said, if you really wanna make your name or like people, and I'm probably saying it wrong, but something along the lines like, if you really wanna impress people, don't go to like DEF CON or somewhere and talk to a bunch of techies. You need to go and talk to people who don't know this stuff and then they'll think you're like this God in tech. And it sounds like that's what you've done. - Yeah, it's definitely the case. It's like, I've like done technical feats that I'm like proud. Like I feel like this is my lifetime achievement, but they're so technical that only people in the industry understand what they are. Whereas like stopping a global ransomware attack, that's something that end users can understand, like the general public can understand. Okay, this person has stopped a bad virus. And same with the Airbnb cameras. It's like, okay, this is how you find cameras. And that is very common thing in cybersecurity is the really technical, like amazingly impressive stuff, it usually doesn't get past like a tech audience. (intense rock music) - Marcus, you've got a very interesting story like I said, and people can see it in lots of detail on Wired and on YouTube videos. And we don't expect you to do the same here, but if you just could give us like the highlights of your background, because I want people just to realize that you did something really special. You've got an interesting story, but what's really cool, I think, is that you're taking that knowledge and experience and now you're helping others, who for instance, are trying to get into cybersecurity. So if you could just give us a quick rundown of how, how we got to where we are today. - Okay, so I think the quick rundown is, so I started out writing malware as like a teenager. I got out and I got into cybersecurity, ended up stopping WannaCry, which was this global ransomware virus that was launched by North Korea. Right after that happened, I kind of ended up getting thrust into the spotlight in somewhat uncomfortable way. And then immediately I got picked up by the FBI on the old stuff I did as a teen. And then kinda as that all blew over, I just started teaching. - Yeah, I love it. I mean, I think you've said, or I've seen it said that you like were the most famous person in the UK for two days. (Marcus laughing) - Yeah, that's pretty accurate. - Yeah, I mean, I'll just say, I mean, I'm based in the UK. So just for everyone who's watching who don't know what the NHS is, it's the National Health Service in the UK. And I mean, it was a major problem. It's better if you tell the story, but you registered a domain that basically was a kill switch for WannaCry, is that right? - Yeah. Yeah, it beacon out this domain. It's not clear why, but basically, if the domain is online, it will just seize all activity like it doesn't decrypt the files, it doesn't spread, and I typically registered these kind of domains as a job, like we will try and find unregistered malware domains and then hijack the malware. So I went and registered this one and it just stopped the entire cyber attack. - I mean, it's an amazing story, and I mean, again, just for everyone watching, you can go and see Marcus' full story using the links below. It's a fantastic story, but Marcus let's bring it to today. You have about, if I went and looked over 400,000 followers on TikTok, is that right? - I think so. I haven't checked in a while. Yeah, it's probably around 400,000. - Tell us why did you start your TikTok channel? - So I'd kind of always been wanting to get onto TikTok 'cause it just seemed like a really cool new platform. But I was so nervous 'cause it's a very different generation. Like YouTube is typically like millennials and above, whereas TikTok is Gen Z, and I was like, I was just terrified that I was gonna get roasted. And someone forced me to go on there to do an interview, and like people really liked my channel. So I was like, oh, okay. I guess I'm not gonna get roasted by Gen Z. So I'll continue on this platform. - But yeah, how do you think I should feel? like I mock myself. I'm not really a boomer, but I often get called a boomer, where's my walking stick? So I mean, guys like me get really roasted on platforms like TikTok, but I think it's amazing. I mean, I think it's amazing that someone like you with that really cool story is now teaching what I would call the next generation. But you're also in YouTube, is that right? - Yeah, so I started out on YouTube originally. Oh God, it's gotta be like 10 years ago, I think. I found it quite a hassle. People are quite picky about like the video quality, the editing quality, the audio quality, and it feels like you are basically making this like production grade movie just to upload and get like maybe 1000 views, and it was just such a huge time commitment and I just like, I couldn't keep doing it consistently. - I mean, that's a problem. And I think you do a great job of it. Like the other one I saw you posted recently was like, should I use, someone asked you, Should I use the school Wi-Fi? - Yeah, yeah, yeah, that one was like a couple of days ago, I think, I posted that. - I was warned not to connect my cell phone to the WiFi at my school. - Yeah, this is pretty much true. Whenever you go to website, it does a DNS lookup and that DNS lookup is not encrypted. So they can see the domain for the website you're on. So if you go to google.com, they can see google.com, but if the website is encrypted, they can't see what page you are on on that website or what you're doing. Now when it comes to emails, things are a little bit more complicated. It depends on if your client is encrypting messages or not. Some do, some don't. If it isn't, then any emails you send and receive while on the network, they could theoretically read. They might not have the software to actually intercept and log those, but it is possible. - I think what's really cool about that is you are taking technical terms and you are bringing it down to non-technical users understanding you. - Yeah, so that's always been the primary purpose of even my blog when I was doing malware analysis, it was geared towards something that someone who maybe doesn't work in the industry could read and understand. Like I did have some very technical blogs, which were like going through my process, but a lot of it was like, here's how this malware feature works in terms that like, you could just go and find like one of your parents and just be like, Hey, would you want to learn about malware? And then I carried that on with TikTok and it was like, let's take this like complex cybersecurity concept and try and boil it down into a way that like people can take something away from it. - When I spoke to shenetworks or notshenetworks depending on if you're on Twitter or TikTok. I asked her the question, how on earth do you take a technical concept and boil it down into like 60 seconds? So let me ask you the same thing, because I'm more on YouTube than TikTok, and I find it easy to just like explain in like 15 minutes or 10 minutes a concept, but like the two of you are explaining it in like 60 seconds. How on earth do you do that? - So I was always the kid in school who would like, I would write the essays and it would be like, I would just ramble for like 1000 pages of like prelog because I couldn't write long things. So I would just add words for no reason. And I was always the guy trying to pad his essay with like meaningless words to make it reach the minimum character limit. So when there was a platform that's Hey, you can say things in short form, that was already my area. Like my whole life, I had been someone who would just like convey a concept in like a couple of minutes and it was like just great to finally have a platform that allowed me to do that. It's why I struggle so much with YouTube. I find it very hard to drag like these things out into like multi, like 10, 20-minute long videos. - Yeah, huge respect for both of you, because I've watched quite a few of your videos and you are showing like demos really quickly. And one of the ones I really liked is like you were showing, I mean, it's difficult to see how long it was, but it was like 60 minutes, sorry, 60 seconds or so, you were showing like, how do you use malware within like a Microsoft Word document? And you just had this like very basic VBScript. So tell us about that. I mean, I find that on YouTube, I get a lot of flack about like, this is stupid. You're showing like a basic hack and guys wanna like have a lot of these hardcore hacks. But have you found that you've had a lot of, I mean, okay, forgetting the Airbnb, but have you found that you get a lot of good response on these types of like techy videos, which is like showing a bit of code and explaining how it works? - Yeah, so I actually struggled with that video 'cause that was back when TikTok had like a hard limit of a minute and that one was one that should have maybe been two minutes, and I was just struggling to condense that one down. I feel like my TikTok audience is very different from say, my Twitter audience. My Twitter audience is somewhat mixed now, but it used to be purely like very technical people. And if I were to just do a very, very simple video, like basic VBScript macros, they would probably roast me, but then on TikTok, I have a more general public audience. So this is stuff they haven't heard of, and being able to show it in its most simplistic format is the easiest to understand, 'cause like real macros, we could spend three hours going through every feature of that, but this is just simple snappy like here is the most raw purest form of it, and you can see it working is a lot easier when it comes to teaching to like a wider audience. - Do you think it's worth learning like VBScript? I mean, one of the first languages I learned was Visual Basic, and then when I looked at that, I thought, well, that's great to see VB is still around. - Probably no. (laughing) I learned VB6 back when that was a thing, like probably early 2000s and I do not remember a single thing about it. Like for that video, I had to go and relearn VB, or at least learn little bits of VB because it was just so useless, I'd forgotten it. - I love what you're doing as well. I mean, you used the "Mr. Robot." Was that a did you spark that you were demoing with the "Mr. Robot" video? - Yeah. - Sorry, go on. - Yeah, is a did you spark. I just had this idea one day is like, there are some shows where hacking is real. Like "Mr. Robot" tries very hard to do real hacks, and I actually have a lot of the things that they use in the show. So I was like, why don't I actually like show people how these hacks work, like how to do them yourself. And then TikTok, of course, banned my video for criminal activity. And I had to beg someone on the like quite high off on the trust and safety team to basically put it back. So I decided to make a tiny hacking device out of this little thumb size USB chip that I got for a couple of dollars on Amazon. Now this was actually featured in one of the "Mr. Robot" promos. - We're not done. - [Marcus] Now this is actually a tiny Arduino device. So what I'm gonna do is program it to be a keyboard, and when the user logs on, it's gonna input a predefined set of keys, which are gonna run a malicious PowerShell command that'll give me access to the system. Now typically with something like this, we would hide it in the back of the computer where the user wouldn't see it, but I'm just gonna put it in the top for demonstration purposes. As you can see, it has a little flashing LED, which I've just programmed so that you know it's working. So the laptop in the foreground is my hacking computer and the monitor in the background is the victim's system. So right after the user logs on, the command window is gonna flash quickly as the payload is executed, and then it's gonna connect back to my hacking machine. Now that we're connected, any commands I type into my machine are gonna run on the victim's system. So I'm gonna open notepad, calculator, and just for example purposes, I'm gonna browse the files. - Serena was saying the same thing, and this is what I'm concerned about on TikTok. I've heard the same thing. So for me, like a personal story would be, I have a credit card cloning video on YouTube that's got a million views or whatever. And it's like old technology just showing like, just to try and educate. Be careful with your cards. I mean, someone took that exact video and put it on TikTok, obviously in short form format, and they got like, I don't know, crazy a number of views. And then I took the same video and put it on TikTok and they pulled it down. So how are you navigating teaching cyber hacking stuff on TikTok? 'cause as like a content creator, like I'm nervous to put stuff on TikTok 'cause they seem to just pull it down. - I learned the line 'cause I grew up making like YouTube videos back when YouTube was a little more hostile towards hacking content. There's a line where if you show the, I guess criminal aspect of the hacking, but then you go into talking about like how to stop it, how to defeat it, how to detect it, they will usually give it a pass. But then I tried that strategy on TikTok and they will watch like the first five seconds, it'd be like, this is crime, ban. So in the end I actually just, I gave up doing those kind of videos. I've been meaning to try again because there is rumors that the community guidelines are different if you're verified and I just got verified last week. So I'm gonna like test the water and see if they would let those videos have a pass now. But it was the case where I just stopped doing them because I think I was one more videotape down away from a permanent ban. - Yeah, you should come to YouTube. I think it's... Go on, sorry. - Oh, sorry, I was gonna say, yeah, YouTube is better now, but I did have a video taken down like a week ago and it was like a very questionable video for them to take down. It was me entering my like credit card details into like one of those phishing sites to show what they did with the credit card. And it's like, it's not like I'm showing you how to steal credit cards or I'm stealing other people's credit cards, it's like, I'm literally just entering my own details into a phishing page and apparently that is crime now. Scan so you don't have to. I got this email from Stevieee G, which said she saw a video of what looks like a very suspicious page. She got a similar link and wanted me to investigate. So when I click the link, it takes me to this USPS tracking page. Now the first red flag is that the domain contains the word USPS nowhere. A good scam page might actually try to look like the USPS URL or at least have the word in there somewhere, but I don't think these guys have really tried at all. Anyway, let's enter my credit card details. The previous page asked for my shipping address, but really what it was probably trying to get is my credit card billing address, which would usually be the same. Now this page is asking for a $2.13 fee to process the redelivery, which sounds reasonable. Now typically a real site would immediately charge my card, but I got no charge here, which means they probably just saved my card details for later, which is a huge red flag. It claims to have sent me an SMS message, but I got no such thing. What I did get is a charge for $16 about 10 hours later and I'm guessing the 750% markup is not state tax. So yeah, it only took about 10 hours for the scammers to use my stolen card. - Yeah, I find that like it's on YouTube, don't show credit card stuff or like phishing, even though I've just done a phishing video with Corey, and that's doing really well. But we're explaining how it works and how to be careful with it. But yeah, it's interesting. It's a hard line, and I mean, this is a problem, I think, for all like content creators who do cyber or hacking stuff, it's a very difficult line because you wanna educate the audience, but it doesn't look like the platforms are there yet. - Yeah, it's very hard because like the general public doesn't understand ethical hacking. Like the idea of someone knowing and using criminal techniques, but in a good way is foreign to them. Like I most saw this with my hotel key card cloning video. I got like so many hate comments from like, you're showing people how to like do whatever, illegal stuff, and like the reality of the video was I bold it down in a way to show the concept without actually showing how to do it. Like I make it look very easy, but that's because I'm cutting out what you actually have to do to get there. Like when you clone these cards, you have to basically program the cloner to clone them. And I just left out the programming part. If you just watch the video not knowing how that works, it looks like I just have a magic device that just clones key cards. And then it looks like I'm advertising said magic device. But the reality is that is like, there's a lot of work that goes into that and people don't understand that. So they were like, basically accusing me of like teaching criminals how to like break into people's houses. This is why you probably shouldn't leave access cards lying around. This is a device I picked up for a few hundred dollars. It's called a Proxmark and it can clone anything from HID cards to hotel keys. Here's how quickly it reads the data off my key card. And it still works from a few inches away. The best part is it'll even work through a coat pocket. Now, obviously this whole setup with the laptop is a bit conspicuous. So you can actually put it in mobile mode and it'll work from a battery pack. Holding down the button will start a scan, and when it comes into contact with a key, it will save the data. Now all we need is a hoodie, connect up the USB power pack to my Proxmark and put one in each back pocket. I'll connect the antenna to a really long USB cable, put it down my sleeve and then plug it into the back of my Proxmark. Now I can log a key card just by brushing past it. Once I've got the data off the card, I can create an identical key, but it's actually a lot more fun to use the Proxmark itself as a key. - Yeah, I mean, I have the same on YouTube. I mean, you get the guys or the people who love it, and then you get the people who hate you and say you're teaching criminals, but I'm really happy to see in the last few years that ethical hacking has become more mainstream. And I think "Mr. Robot" helped perhaps with that to get people more interested. But I mean, with all the hacks out there, how are companies gonna protect themselves if you don't know what's going on? - Yeah, like there's more criminal, sorry, there's more non-criminals in the world than criminals. So if I teach everyone how to do a crime, then you have maybe like 5% of people who are gonna commit crimes, and then you have the rest of the people who now know how to stop that crime. So it's always gonna be a net benefit, but people don't really understand that. - So you finding that, I mean, based on the questions I see that you're getting asked on TikTok, are you finding that it's just a general audience who are interested in getting to cyber or is it just like general education, like what you'd see on television perhaps? - It's a mix. I get a lot of comments. So like, Hey, I'm looking to transition into cybersecurity, like how can I do that? But a lot of the people are like, they don't have any interest in getting into cybersecurity, they just think the stuff is cool and they like to learn things. And I'm very much the same way. Like, oh man, I think I spent like an hour watching some dude like explain how to unclog drains. Like his job was unclogging, (David laughing) like street drains. And I was like, this is fascinating. And I had no intention of going to unclog street drains, but I just found it interesting. So I would just follow him. - Yeah, I've seen videos, guys like cleaning, what are they? They mow the lawns and they clean the pavements and stuff. It's like, that's definitely a job that I don't wanna do, or they're washing cars. It's amazing how many views those kind of videos get on YouTube. - Yeah. There's the pool cleaner guy who has like millions of followers and he just cleans pools, and it's like, it's interesting to watch. - One of the things I wanted to say, I was surprised you've got like an Instagram hacking type video that didn't get pulled down. - Yeah, that one was... I thought that was gonna go, but I think it was 'cause it was geared purely towards like awareness, like I didn't really show how to do it. - Here's a common way hackers get into an Instagram account that you might want to watch out for. The hacker will get access to one of your friends' accounts and then contact you basically saying that you've been nominated to help them get back into their account. On Instagram, the way the password reset feature works is instead of sending you to a password reset page, it just sends you a link that will log you straight into your account and then you can change your password from there. So what they actually do is they go to the forgot password page, then they enter your account rather than theirs, which results in Instagram sending you a login link. And then they'll try and trick you into sending that link to them, which is what you see here. And if you do send that link to them, it will log them straight into account and then they can change the password and lock you out. Like and follow for more safety tip. I explained how it works, but that seems to be the line for TikTok, it's whether you explain how it works or explain how to do it. YouTube, the line is you can explain how to do it as long as you explain how to undo it, but TikTok, it seems like really, if you can say how it works, but if you show how it works, you're done. - From what we've said offline, you are gonna be uploading content to YouTube. So for people who wanna subscribe, please use the links below. Show your support, or if you prefer TikTok, go to that platform. So on YouTube, are you gonna be doing long form or is it like TikTok type style shorts? - Yeah, so people on YouTube seems to hate my TikTok shorts. (David laughing) It was always supposed to be my long form content. Like I'll do some short snappy videos for TikTok and then I do the longer videos on YouTube when I have them. - Again, for everyone who's watching, please go and subscribe, show your support, show your love from the community. It's amazing like from my point of view to have people like you that are willing to share with the next generation. So let's talk about like cyber and your sort of experience and advice, 'cause I know you've been putting some of this on TikTok and YouTube, but I'd like to like just try and wrap that information into a video for people who are interested. This has been recording sort of midway through the year and I've done some career stuff early in the year, but it'd be nice to get an update and sort of get your perspective. So let's ask you this question. Do you have degrees, certifications, whatnot in cyber? - Me personally, no. - Yes. But you have been very successful in what you've done. So I think the question is, are certifications and degrees required? - Absolutely not. I feel like there's no true path into cybersecurity. Degrees and such are actually a very new thing to my understanding. Like there wasn't cybersecurity degrees, at least in the UK when I grew up until about, I'd say maybe even like 2015, like it came out quite late. So before that, you would just go and get like a computer science degree, which would be entirely useless for cybersecurity, and that would be if they required a degree that would meet the threshold. But a lot of companies realize that computer science, it is not cybersecurity. So if you could show some kind of experience, they would waive those requirements. - So would you recommend certs for someone trying to get into cyber, or would you recommend they do something else? I've seen some of your TikToks, but you've kind of recommended different things. Is certs good or would you just say like get experience, or what would you recommend if I'm 18 or someone trying to get into this field? - So I try to avoid recommending 'cause like I try to give a balanced view 'cause everyone is different. Like I really struggled at school. I'm not good at structured learning, probably 'cause I have like weapons-grade ADHD, so I can't just sit in a class all day. So I found it very easy to just learn on my own. Just go on YouTube and Google and blogs and just research. But then there's people who do like structured learning. So it really depends on like, what do you feel like fits you most? Like if you feel like you're more of a like a university/college kind of person, then maybe get some certs. Degrees are a little... I probably wouldn't go the degree route 'cause it's a lot of time commitment for not really a huge benefit. Certs seem to be like more of a thing that companies look for. They typically prefer those over degrees 'cause it has like domain-specific experience, whereas like a cybersecurity degree would be very general. So I would lean towards certs if you like structured learning, and if not, you can do it without certs. I think it's very dependent on the country. In the UK and US, it's very easy to get a job without certs, but in other countries, it might be different. So I can't really say for those. - But let's focus on the US mainly, 'cause I think you're basically in the US now, is that right? - [Marcus] Yeah. - One of the things I've heard you say, and I'm a real believer in this is put your work out there. You've got a very famous blog. Can you tell us about that blog and tell us how it helped open doors for you? - Yeah, so my blog is pretty much what made my career. I just wanted to document my work. Like I was doing malware research. So I would work through my malware research and I would just document it as I go, and then I'd publish that to my blog, and, of course, what I was unknowingly doing was building a career profile. I was basically showing not only can I reverse engineer malware, but here's like an entire walkthrough of me doing just that, which actually turned out to be more valuable than any degrees, certs or whatnot, because I was showing like real world experience in the domain that they wanted to hire me for. - Yeah, I mean, I love that. I mean, it's like when I look at hiring people, I mean, it depends on the job, but like in, I'll just take an example of video editing or something. It's like, I don't care what cert you got, show me your work, show me what you can do. And I think your blog is a great example of that. I believe there's a story where your blog opened up doors to say the UK's version of NSA or something. Is that right? - Yeah. (chuckling) (David laughing) - GCHQ. Yeah, sorry, go on. - It was kind of funny because I had just applied for GCHQ and at the time my blog, it was MalwareTech blog, and then there was me Marcus Hutchins. And Marcus Hutchins went and applied for GCHQ. And then while I was in the application process for GCHQ, someone reached out to MalwareTech and was like, Hey, we would like to hire you. And I had just basically been formally offered the job at GCHQ under my real identity. So I was like, this is me. Like you're already hiring me. - That's such a cool story. And I think it just shows again, put your work out there and people will find you. What do you think? I mean, I think it's obvious, but what do you think about like people posting stuff on Twitter, posting stuff on like LinkedIn, getting involved on social media? - Yeah, I think that is by far one of the most useful things you can do for your career, because when you're just Tweeting, like you don't have to be serious. You can have fun on social media, but you will come across people who work in the industry and those people know people. I think my first real job offer came as a result of someone I knew on Twitter. I just got a DM one day and he's like, Hey, I work for blah, blah, blah, big company. Would you like to come work for us? And I just feel like the more time... This sounds counterproductive, but the more time I spent on social media, the better job offers I started getting. - I mean, there's a big community in cyber on Twitter, so it makes a lot of sense. So if I'm like brand new, is there any like tips you'd give me? Like obviously start a Twitter account, go on LinkedIn. Is it like, just like post stuff, like stuff that I'm doing, tag people like you or any kind of recommendations? - I typically say avoid tagging people because it feels like you're kind of throwing it in their face. Whereas like the people who are interested will find your stuff. Definitely document what you're doing. Blogs I find are the best form. Videos are cool too, but blogs really, 'cause they show up when people are searching for other things. Like there's been countless times where I've been doing research on malware and I've come across my own blog and I've been like, oh, okay. (David laughing) And like that will happen. And then obviously like Tweet those links on Twitter. Not really familiar with LinkedIn, but I assume that would be a better place given that that's all the business professionals. I really don't know, but just get as much exposure on social media as you can. - That's really interesting. I mean, I was interviewing someone the other day and one of the comments on YouTube was like, David, you're a real boomer asking a millennial about LinkedIn. So you just use Twitter, you don't use LinkedIn really? - Yeah, I find LinkedIn to be somewhat obnoxious. It's like, I can see the purpose it was meant for, but it really feels like, it's more like a social media platform for executives and it's just like, it's not the kind of content I want to read. Like I don't want to read about some executive like patting himself on the back. - Let's put this into perspective. How old were you when you started writing code? - 11 or 12, I think. It depends whether you class HTML as a coding language. I personally don't (David laughing) so I just say 11. - But I mean, so in other words you were writing HTML before you were 11, yeah? - Yeah. I think about like eight or nine years old. - I think some people who are older might see that as like, I'm not as clever as you are, and I think that's also the wrong way to look at it, but the way I'd look at it is I've got daughters who are in their teens. It's never too early to start working with IT if you love it. Look at you, you started young. When were you starting to do malware, or when did you understand malware, that you could reverse engineer it or create, how old were you? - So I started creating malware around like 12 or 13, and then I didn't really start fully understanding it enough to reverse it until I was about 15 or 16. I definitely find that like I still am learning new things every day, but I definitely find that when you're young, your brain just absorbs knowledge so much better. Like they say kids find it the easiest to learn languages, and I assume that probably applies to programming languages. It's gonna be like harder to learn the older you get. So it's definitely a bad idea to assume that like you are too young, like you don't have the knowledge and intelligence, because actually it might be better. - Okay, I wanna get into cyber. I should blog, I should create content, put it out there. I should like go on Twitter, follow people, interact with the community. I mean, be a nice person is what I always say. Be someone positive and bring stuff to the community. Don't spam people. But the big question I always get is, okay, how do I get experience without a job? And it's that old joke. You need to have 20 years of experience to get through the door, and the product has existed for five years or whatever, stupid example out there. How would you tackle that, or what would you advise someone to do? - Cert are building experience, like degrees are less so actually, but certs build a little bit of practical experience. Doing the thing yourself, where to document on your blog is experience. Like what I found is they want experience by any means. They want to see that you can do the job. And if you have a blog post up where you are doing the job, then that will count towards experience. So I would just say, find some projects you like. For me, when I started out software though, I would just pick some random idea that came into my head and I would go and code that, and then I'd do the same with malware. I would just find a random piece of malware and I would just reverse it, and just finding cool projects to do and then documenting them on your blog is very, very useful. They don't even have to be like typically projects you would do for work. Like here's some silly app I wrote for fun. It's still showing that you can program, it's still showing that you can document your work. - Is programming required in cyber or would you recommend programming? And is there specific language you'd recommend? What are your thoughts about coding? - So it's absolutely not required, but I would say it will not only boost your skills, because when you understand the coding, you can understand more about like how to protect a product or how to defeat it. I found it increased my salary a lot because not only could I do cybersecurity stuff, I could write solutions. I could be like, okay, here's the problem we're having. Like I know, I've reversed some malware and here's something we could build around what I've done. So I would definitely say that like coding is an invaluable skill, but it's not necessary. It takes a long time to become proficient in coding. If I had to say a language, I'd probably say, start with Python, 'cause that's one of those languages where you can just throw something together and it's fairly easy, it's fairly forgiving, and it's very commonly used in cybersecurity. - What's your thoughts about like Golang versus Python in the future? I mean, I've heard that Apple are removing Python from Macs as an example. Do you think Golang is another language people should look at? - So I'm on the fence about Golang because it hasn't really gotten widespread adoption, it's still quite niche. - [David] Yeah. - It's a very good language. It's very easy to program, again, very forgiving. It's basically someone has combined the best aspects of Python, C-Sharp, C of maybe even a bit of PHP, but I don't see it that much. Like if I were to go to a random company and be like, Hey, can we write this in Golang? They'd probably tell me no. My company specifically does use Golang, but I don't see it around very much. - Do you think there's a future in it or is there's like still like, if you're on the fence, just learn Python, yeah? - Yeah, I would definitely say Python right now. And the beautiful thing is once you learn Python, Golang is a breeze. Like I think it took me a couple of weeks to be able to write Golang from just like knowing Python. Well, I did know C, but once you get some languages down, learning new languages becomes very, very easy. - How would you go about learning languages? Did you have books, stuff like that or was it just like YouTube videos? How would you suggest to someone? Or look at TikTok, but what would you recommend? - Again, I'd probably say it's personal preference. Go and watch some YouTube videos, and if you find that sticks for you, great. Maybe if not, get a... Actually, I wouldn't say get books, like most of the stuff you can find in like in virtual format. So I'd say maybe go and find a PDF version of a book, and if that works for you, great. But what really, really worked for me was just coming up with an app idea. I think my first app was some kind of like trading bot or something. I just like, I wanna make a trading bot, and then I just threw that together. - I'm very much in agreement with that. I remember taking a university course on Python from the famous UK university, which I won't mention right now, but I thought it was the most boring course on earth because they were just teaching Python, like from a math or maths for the UK viewers point of view. There wasn't a real reason. And I wanted to learn Python at that time for like network automation. - Yeah. - Go on, sorry. - Yeah, I was gonna say, I struggled a lot with math or maths in college because I really did enjoy math. I was very good at it, but the way they would teach it was a very just theoretical. It's like, they're not telling me how is this useful? How can I use this? What can I do with this? They're just like, blah, blah, blah, plus blah, blah, blah, blah, blah, blah. And it was just so unbelievably boring, I couldn't follow. - Yeah, I mean, I think I've heard you say that you found the computer courses, same thing, computer courses so boring that you just went and studied books. Sorry. Well, you tell us, what did you do? 'Cause the courses were boring, you did like a whole bunch of stuff on the side, yeah? - Yeah, I think I was studying malware development at the time. (chuckling) So I was writing malware while they were trying to teach. What were they trying to teach? I think it was HTML5 or something. Like the course was supposed to be, I think C, but a lot of the class was struggling with like the basic foundations of programming. So they dropped it back to HTML5, which is a lot simpler. And like the course was supposed to be an object-oriented programming. So doing HTML as object-oriented programming was just ridiculous. And it was so unbelievably boring I just couldn't. - Was that at uni or was that at school? - So it was a community college. I don't know what the American equivalent of that is. Maybe it's the same thing, but it was that bit between like high school and university. - Again, I was gonna say, I really agree with like, don't learn programming for the sake of learning programming, learn programming to accomplish your goal. Like you were doing like malware analysis. Is that why your blog is called MalwareTech? Is that like sort of where it came from or why is it called that? - It was kind of a joke about the fact that like when I very first started the blog, it was when I was still a malware developer. So it was kind of an inside joke about like me writing malware. - So let's talk about that. If I wanna get into malware or reverse engineering, do you have any recommendations for that? 'Cause that's what you do now, is that right? - No, but I think it's the closest thing that is explainable to what I do. Yeah, so malware is a very hard one to get into because it's not a foundational skill. It's basically the opposite of software engineering. So first you have to understand how the software is built, then you have to understand how to take it apart, then on top of that, you have to understand the tools and all of the like mitigations malware can have. So it's really three levels of skills. My background was programming. So I came from a programming background, I didn't have to learn that specifically. I would probably suggest that it would be best to learn programming if you're gonna do malware analysis. I haven't heard of anyone getting in from a non programming background. I'm sure there are people, but I can imagine it would be very, very hard to learn how to reverse engineer code at the same time that you're learning how code works. - Yeah, so I mean like do computer science or like at least like learn Python or at least get into the coding world, is that right? - Yeah, so if you're doing native software reversing, you'd probably want to learn x86 assembly or x64. - The other question I wanted to ask you, which I missed earlier is do you recommend bug bounty as a way to get experience? - Honestly, I hate bug bounty. (David laughing) - What do you mean? You're gonna become a millionaire doing bug bounty, come on. (both laughing) - Like it genuinely feels like, what's it called? There's those schemes where people like sell hair products and then you have to get people on duty to sell the products. It feels- Yeah, like a down line, that like multilevel marketing or whatever, yeah. - It feels like that, 'cause you have some very skilled people at the very top making millions and everyone else is just making dimes. Like if you are from like a poor country, then I would very much recommend it because that money in like an impoverished country is a lot, but if you're living in the US, like $500 for a month of work is like, you could just go and get a job and get paid like 10 times that. - You covered this on TikTok as well, you said, do it when you're in school, I think was what you said. Like do it to get experience, is that right? - Yeah, so my recommendation was, if you're gonna do bug bounty, do it as either a side job or while you are in school learning because the money is not consistent, the companies, they will screw you, and it's very like anxiety inducing to try and rely on something that essentially there is no guarantee you're gonna get paid. There's no monthly income, there's no 401k, there's no medical leave. You're basically just, you have to find a bug to get paid. So I think it's quite a predatory industry. You're basically essentially asking people to work. Like, I don't know if the US has the word, but in the UK we call it zero-hour contracts. And it seems very much like exploiting labor, but again, if you come from a lower income country, that money is very decent, and yeah, I would do it. - Yeah, I like what you're saying. Do it when you've got another job or you're in school and you wanna get experience, yeah. Don't go quit your job to do that. Do that on the side, I think is what you're saying. - Yeah. I see people on Twitter, like there's a couple of bug bounty millionaires who are basically just suggesting people quit their job to do bug bounty. And it scares me. - Yeah, I mean, I think it's important that we look at the good, the bad and the ugly of everything. And I wanted to ask you about CTFs. What's your opinion of CTFs, 'cause that also gets a lot of like, people say, do CTFs. - I think it's a good way to tune certain skills. I find a lot of them don't correspond to like real world hacks or real world skills, but it'll be like a CTF that covers reverse engineering. It doesn't matter what you're reverse engineering, you're still reverse engineering. But I do find that a lot of them don't really show the real world things like Hack The Box. A lot of the hacks on Hack The Box are not things you would typically encounter in like a real network, but you are still learning like Python and you're learning about exploits, and you're learning how like Linux works. So you are getting valuable skills, but it's best not to assume that you are learning everything. - I think it's important, like you said. I mean, the goal is to get a flag. In the real world you're not gonna necessarily get a flag, are you? But I like what you said earlier, different people learn differently, and in your path isn't the path necessarily for everyone. - Yeah. - I like what you said, find what works for yourself. If it's YouTube videos, use that. If it's TikTok, use that. I find it like strange how some people like say, because this is their view, they try and force everyone down that path, and people are different. I mean, you're from the UK and you live in the US, I'm from South Africa, I live in the UK. Everyone's different. You gotta find what works for yourself, right? - Yeah, I really don't like the people who will, they will say, oh, you need to have certifications 'cause I had certifications, or you need to have a degree 'cause I have a degree. And they just try and like funnel everything into this very narrow world view they have. Whereas like I've spoken to people who have gotten into cybersecurity, through like they worked in a medical field and because they understood medical devices, they could understand how to secure them. And it's like, there is no set path. In fact, I would say cybersecurity or tech in general is one of the like least structured fields. There are a million ways in, and I don't like when people try and make it sound like you have to do this or you have to do that in order to get into the field 'cause it's simply not true. - Yeah, I mean, and I think it was either YouTube video. Yeah, I think it was one of your YouTube videos you showed that chart where like how vast it was, right? - Yeah, it I was a YouTube video. Now this is something someone sent me. It's basically a map of all the certifications, which correspond to different areas of InfoSec. So once you've figured out what area of InfoSec you want to get in, you can look at what certifications map to that area. - Marcus, what's the plans? Because I want to ask people to go and subscribe to YouTube channel. What are sort of your plans going forward? Are you gonna create more content on TikTok, YouTube? Where can people go and what would you recommend they do to like learn from you? - So I think the YouTube videos are the most informative, 'cause they're longer form. TikTok is cool to like learn like quickly a concept. It's very snappy, it's not too much of a time commitment, but I am gonna be focusing, like I'm trying my hardest to come up with YouTube videos, but it's a lot of the stuff I do just ends up being a minute or two and it's better off on TikTok, but I would definitely just check out my YouTube. I do have a lot of videos on reversing, how to get into cybersecurity, and probably check out my TikTok as well. - But Marcus, you need to have like a decade of experience and a degree before you can actually teach or write code, right? (Marcus laughing) - Actually people make jokes about it, but I do genuinely see like job postings like that. There was one I think famously that got posted on Twitter where their job was genuinely requiring more experience in a language than that language had existed for. So yeah, you will find a lot of job postings with insane like requirements, and my advice is just don't get disheartened by them 'cause it's actually a very small minority of jobs. It's just the companies that people think of. Like the biggest issue I see people running into is they think tech companies, they think Microsoft, Google, Cisco, and those are very big corporations with like HR departments who are gonna have all these filtering techniques and they're gonna do keyword searches on your resume. And if you don't have certain keywords, they're just gonna throw it in the bin without reading it. But then there's plenty of small companies who will hire you at like insanely high salaries with just the minimal needed experience. So I think it's more like, it's kind of a perspective thing, is it seems like you need all these qualifications to get into cybersecurity because some of the very big companies require those, but then if you look around the smaller companies, it's actually very, very liberal. - I think that's great advice, and I think it's a great advice for someone who wants to create content or just to learn, and it's great advice for someone who's looking at a job and there's like 100 different requirements. Don't let that put you off. I always say apply even if you don't meet the requirements straight off. - Yeah. So one thing I would definitely add to that is I have seen job postings where it's like, you must have a degree and you must have certifications, and then a recruiter has reached out to me and be like, Hey, we would like to hire you for that job. And I was like, I can. I don't have the qualifications there. Don't worry we'll just waive them. And there are a lot of companies that are willing to waive the requirements. So absolutely what you said, even if you don't meet the requirements, apply for the job, 'cause there is a good chance they're struggling to fill that position and they will look to you as a viable candidate. - Yeah, I mean, I think you've said it on TikTok as well. I mean, the companies are so desperate to have people. There's a lot of opportunity, isn't there? - Yeah, like I know we've hired people who don't have any skills in the area we're hiring them for 'cause you can tell if someone has the, like the drive and the ability to pick up new skills. I love to hire people who like, maybe they don't necessarily understand malware or they don't understand like whatever we're hiring them for, but they've shown like initiative and they can teach themselves. They can be self-sufficient. Like those are my favorite kind of employees. 'Cause maybe we are doing malware analysis today, like maybe malware gets sold and we have to go and find something else. Well, now we've gotta retrain that employee. But if you have someone who can just teach themselves, they're self-sufficient, then it doesn't matter what you want them to do, they will just go and learn it. - Yeah, I love that. I mean, so you interviewing people, like the candidates that you've interviewed, what's like really stood out? Like it made you think, okay, this is someone I wanna hire? You've mentioned like they need to be able to like teach themselves. Like any other tips like for someone who goes to an interview. What advice would you give me as an example? Okay, not me, but someone like who's younger, perhaps who wants to be interviewed by you, what are like tips to let you make them more likely to be hired by you? - So I don't really do hiring much, but I must caveat that my hiring practices probably are not in line with the industry norm, (both laughing) but my first thing is, of course, like, is this person like self-sufficient? Are they gonna be someone we're gonna have to give lots of training to and we're gonna have to point in the right direction, or is it someone who has like a knack for learning and they like to explore and they like to like bring in new things. Yeah, so self efficiency is my main one. And well, probably the last person I tried to hire, we weren't successful in hiring them, they got poached, but he was in a chat I was in and he was like sharing his work and collaborating with others, and I was just looking at this person like they can teach themselves, they can go and find new things on their own, they work great with others, they're like very open to collaboration, and like that's my perfect employee. Even to the point where like, if someone collaborates with other companies, I don't mind. Like as long as they're like, they're doing the work for us and they're like, they're learning things from their collaboration with other companies, like, I really couldn't care less if they're also helping another company. - I mean, I love that. In school and places that are not real world, they expect you to like take a test by yourself, but in the real world, it doesn't work like that, you have to collaborate. - Absolutely. Like cybersecurity is probably one of the most like collaborative fields I've seen. It's like, it's so vast and like everyone has like a little bit of insight that someone else doesn't have. So the more people you have collaborating, the better it is. I've got to the point where we've like actually given technology to rival companies in return for their tech, and like the rising tide, it raises all boats. So we are not losing out by actually giving away our IP to rival companies because there is so much to be learned. - I wanna wrap this up with like, what's your final advice, for instance, someone who's young or someone who's older? Do you have any advice for... And I mean, you can give us your age if you like, but you don't have to, but like someone who's younger and wants to get into this field, what's your advice? - Yeah, I think it really goes back to what I said earlier. Find what works for you when it comes to learning. Learn some things, while you are learning, show those things to other people. I find it seems counterproductive to be teaching things that you are learning, but I find it's like, that's when the knowledge is the freshest and you actually solidify your knowledge by then trying to explain the things you've learned to other people. I definitely did that a lot on my blog. I was blogging things that I had only just learned and I think that's very valuable, not only from a career perspective, but from a just solidifying your knowledge. - I really wanna just talk about that because I've seen like people, I hate to use the term, but gate keeping saying you have to have like a certain amount of knowledge before you share and I'm really against that, 'cause I agree with what you've just said. There's no better way to learn than to teach. And even if you teach it to yourself, put it in a blog and five people read it or you read it later. - Yeah, 'cause- Because you... Sorry, go on. - Yeah, so one thing I've definitely has happened to me is like, I've been struggling to understand the concept because maybe the person who first portrayed that concept didn't put it in the best words, and then someone who did understand their words came along, they learned it, they put it out on their blog in some different words, and I like, ah, that it just like clicked. And I think that is a very, very valuable and I think it's complete nonsense that you have to have lots of experience or you have to be an expert in order to portray something you've just learned. - Marcus, I could keep you here for hours. I really wanna thank you for sharing your experience, and thank you for putting yourself out there because I know as a content creator, some people throw stones, but I really appreciate you sharing. - Thanks so much for having me on. - Great. Thanks man. (intense rock music)
Info
Channel: David Bombal
Views: 282,863
Rating: undefined out of 5
Keywords: wannacry, wannacry virus, wannacry ransomware, wannacry documentary, marcus hutchins, marcus hutchins documentary, marcus hutchins camera, marcus hutchins disrupt, marcus hutchins interview, marcus hutchins mr robot, hack, hacker, hacking, darknet diaries, ransomware, cybersecurity, cybersecurity documentary, ethical hacker, hacking story, kali linux, wifi, airbnb, airbnb camera hidden, airbnb camera, hidden camera wifi, hidden camera clock, airbnb hacks, airbnb hacks for guests
Id: sxCUZFVM8xk
Channel Id: undefined
Length: 56min 30sec (3390 seconds)
Published: Sun Jul 17 2022
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.