Archive for hacking
You are browsing the archives of hacking.
You are browsing the archives of hacking.
Integrated attack strategies involve combining hacking computer systems with attack vectors such as: espionage, blackmail, medical/health attacks, asymmetric “guerrilla-style” attacks, weapons of mass destruction, and conventional kinetic military attacks. The video below shows an example using a medical vector, and an unprotected printer, to compromise patient and identity records that can be used in future […]
The short video clip below is an excerpt from a recent Defcon talk about cheating at poker using an electronic device that uses infrared to read specially marked playing cards. Watch the video first, then keep reading to get the whole story. Poker analyzer basic demo – [youtube.com] Here’s the whole story: Full(er) House: Exposing […]
Hacking computers is a mysterious and dangerous world that most of us don’t really understand. This video shows some hackers at DEFCON demonstrating their techniques on a reporter who volunteered to be hacked. The video shows some basic “social engineering” which may use technical knowledge and experience, but involves classic “confidence” manipulation to gain credentials […]
If the NSA has managed to inject backdoor access into most U.S. produced technology, they can win a victory in the intelligence war, but we the citizens may find it necessary to abandon some of the use of American technology ourselves. If we can make our enemies afraid that we can access their computers and […]
Our GPS satellite system puts out two sets of signals; one for our military, which is encrypted and highly accurate, and another signal for civilian use, which is not encrypted and is less accurate. Most domestic drones are currently using the unencrypted civilian signal set, which leaves them vulnerable to fairly simple spoofing attacks. By […]
The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare – [sans.org] 2. Background On December 30, 2010, a patriot hacker posted a message to an Internet Chat Relay (IRC) Server. Quoting Steve Jobs, the hacker typed: “A small team of A players can run circles round a giant team of B and C players” […]
For a long time, p0f has filled a mostly empty space for passive reconnaissance tools. There is now an updated version (a release candidate) with some new features. p0f v3 (release candidate 0) – [coredump.cx] 1. What’s this? P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify […]
Netragard’s Hacker Interface Device (HID) – [snosoft.com] We (Netragard) recently completed an engagement for a client with a rather restricted scope. The scope included a single IP address bound to a firewall that offered no services what so ever. It also excluded the use of social attack vectors based on social networks, telephone, or email […]
Using GPUs to aid in password cracking continues to become more effective in both speed and cost. GPU Password Cracking – Bruteforceing a Windows Password Using a Graphic Card – [mytechencounters.wordpress.com] GPGPU computing is getting lots of attention these days. GPGPU computing simply means doing general calculations on graphic cards (GPUs) rather than CPUs. Traditionally, […]
Hacking Wireless Keyboards With Keykeriki – [securitytube.net] KeyKeriki is a hardware + software tool released by Remote Exploit to exploit wireless keyboards. You can download the theory slides from here. The details about the software and hardware requirements is available on their website. According to them: “Now 1.5 years after releasing our whitepaper “27Mhz Wireless […]