120 private links
Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks. The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day.
Please note, changing your handset’s IMEI number may void warranty or break the law. As far as I know, it’s strictly prohibited to change any phone’s IMEI number in the UK. So always refer to your user manual and local law, you are responsible for any action you take.
More SIM Cards Vulnerable to Simjacker Attack Than Previously Disclosed
WIB SIM ToolKit Also Leads To SimJacker Attacks
Following the Simjacker revelation, Lakatos, a researcher at Ginno Security Lab, reached out to The Hacker News earlier this week and revealed that another dynamic SIM toolkit, called Wireless Internet Browser (WIB), can also be exploited in the same way, exposing another set of hundreds of millions of mobile phones users to remote hackers.
Des chercheurs ont trouvé des failles permettant d’accéder aux données chiffrées nativement dans un fichier PDF. Malheureusement, pour colmater ces failles, il faudrait modifier le standard de fond en comble.
Le PDF est un format de document extrêmement populaire, y compris pour manipuler des données sensibles. En effet, ce standard propose un chiffrement natif fort pratique, censé rendre les données inviolables. Pour l’activer, il suffit généralement de définir un mot de passe au niveau du logiciel PDF. Mais ce chiffrement est loin d’être inviolable, comme vient de le montrer un groupe de chercheurs des universités Ruhr-Bochum et Munster. Ces experts ont trouvé deux attaques baptisées « PDFex », permettant de faire fuiter les informations confidentielles d’un fichier PDF chiffré.
Simjacker Vulnerability
Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards that could allow remote attackers to compromise targeted mobile phones and spy on victims just by sending an SMS.
Dubbed "SimJacker," the vulnerability resides in a particular piece of software, called the S@T Browser (a dynamic SIM toolkit), embedded on most SIM cards that is widely being used by mobile operators in at least 30 countries and can be exploited regardless of which handsets victims are using.
What's worrisome? A specific private company that works with governments is actively exploiting the SimJacker vulnerability from at least the last two years to conduct targeted surveillance on mobile phone users across several countries.
Madness and Obsession on the Electronic Frontier
The Basics of SQL Injection and SQL Injection Tools
Who, what & why
The background on the who, the what and the why of Have I been pwned?
"Hack" like a programmer in movies and games!
GeekTyper was inspired by the various media where hacking is usually portrayed incorrectly.
Simply randomly mash your keyboard and code will display on your screen. Press TAB to display hotkeys that activate various effects
PwnWiki.io is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained.
"Webcam" is based on actual events and was shot entirely on a computer's webcam.
The filmmakers hope that it will make people think more about the technology that we use every day and the effects it can have on all of us.
Le Chaos Computer Club eV (CCC) est la plus grande association européenne des hackers et représentants de depuis trente ans dans la gamme de tension de l'évolution technique et sociale. Les activités du Club vont de la recherche technique et d'exploration sur le bord de l'univers de la technologie des campagnes, événements, publications et conseils stratégiques à l'exploitation de l'anonymisation des services et des communications. Le club se compose d'un certain nombre de clubs décentralisées et des groupes locaux. Ils organisent régulièrement des manifestations et des réunions dans de nombreuses villes du monde germanophone. La CCC offre à ses préoccupations concernant divers canaux de publication, et est toujours en train de techniquement et socialement les personnes intéressées et des vues similaires. Par ailleurs, il soutient et encourage le plaisir de la vie et de l'équipement ainsi que les principes de l'éthique des hackers.
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.
In many ways, this was all my fault. My accounts were daisy-chained together. Getting into Amazon let my hackers get into my Apple ID account, which helped them get into Gmail, which gave them access to Twitter. Had I used two-factor authentication for my Google account, it’s possible that none of this would have happened, because their ultimate goal was always to take over my Twitter account and wreak havoc. Lulz.
Had I been regularly backing up the data on my MacBook, I wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that I had stored in no other location.
To be a hacker !!
exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering.
Ultimate hacker - brain hacker
Even Nolan didn’t think it could be possible when he made Inception, but it turns out that researchers at Usenix Security conference have been speaking of using a computer interface to hack the brain! Yes, it might actually be possible to enter the brain and retrieve information that you’d prefer to keep secret. Like retrieving a combination key to a safe that your dying father might have given you and you have it stored somewhere in the subconscious.
Read more at
http://techie-buzz.com/science/brain-hack.html#iQmdZspXqQMuytCI.99