Archive for hacking

You are browsing the archives of hacking.

Poker Cards Marked With IR Codes

The short video clip below is an excerpt from a recent Defcon talk about cheating at poker using an electronic device that uses infrared to read specially marked playing cards. Watch the video first, then keep reading to get the whole story. Poker analyzer basic demo – [youtube.com] Here’s the whole story: Full(er) House: Exposing […]

How Real Hacking Works

Hacking computers is a mysterious and dangerous world that most of us don’t really understand. This video shows some hackers at DEFCON demonstrating their techniques on a reporter who volunteered to be hacked. The video shows some basic “social engineering” which may use technical knowledge and experience, but involves classic “confidence” manipulation to gain credentials […]

Backdoor Meltdown

If the NSA has managed to inject backdoor access into most U.S. produced technology, they can win a victory in the intelligence war, but we the citizens may find it necessary to abandon some of the use of American technology ourselves. If we can make our enemies afraid that we can access their computers and […]

DHS Drone Hacked by Univ Texas

Our GPS satellite system puts out two sets of signals; one for our military, which is encrypted and highly accurate, and another signal for civilian use, which is not encrypted and is less accurate. Most domestic drones are currently using the unencrypted civilian signal set, which leaves them vulnerable to fairly simple spoofing attacks. By […]

Th3J35t3r – Lonewolf Hacker

The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare – [sans.org] 2. Background On December 30, 2010, a patriot hacker posted a message to an Internet Chat Relay (IRC) Server. Quoting Steve Jobs, the hacker typed: “A small team of A players can run circles round a giant team of B and C players” […]

P0f v3 Fingerprinting Tool (new release)

For a long time, p0f has filled a mostly empty space for passive reconnaissance tools. There is now an updated version (a release candidate) with some new features. p0f v3 (release candidate 0) – [coredump.cx] 1. What’s this? P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify […]

Evil Mouse Penetration Tool

Netragard’s Hacker Interface Device (HID) – [snosoft.com] We (Netragard) recently completed an engagement for a client with a rather restricted scope. The scope included a single IP address bound to a firewall that offered no services what so ever. It also excluded the use of social attack vectors based on social networks, telephone, or email […]

GPU Password Cracking

Using GPUs to aid in password cracking continues to become more effective in both speed and cost. GPU Password Cracking – Bruteforceing a Windows Password Using a Graphic Card – [mytechencounters.wordpress.com] GPGPU computing is getting lots of attention these days. GPGPU computing simply means doing general calculations on graphic cards (GPUs) rather than CPUs. Traditionally, […]

Hacking Wireless Keyboards

Hacking Wireless Keyboards With Keykeriki – [securitytube.net] KeyKeriki is a hardware + software tool released by Remote Exploit to exploit wireless keyboards. You can download the theory slides from here. The details about the software and hardware requirements is available on their website. According to them: “Now 1.5 years after releasing our whitepaper “27Mhz Wireless […]

Cyberwar Defined

War is violent conflict on a large scale, often involving organizations on a national scale. There are many different forms of war and many different levels. We use the terms; civil, conventional, nuclear, chemical, biological, guerilla, asymmetric, urban, jungle, naval, air, desert, trench, psychological, cold and more to describe types of war. A “cold” war […]