Thursday, November 24, 2016


Digital Security


Knowledge of Security is Paramount to everyone in this Digital Age, and many people are not aware of the security threats that are in the digital world.  We fear a spider more than a link, but a link can hurt us far more, if we do not take precautions.

An ounce of prevention is worth a pound of cure. ~ Benjamin Franklin.

You can only stop what you know.  If you are unaware that it can happen, then you are vulnerable.

Were do you learn about Digital Security?  From those who do security, and you can get a YouTube-PHD while watching and learning about what can protect you from harm.

What you will find below is my notes as I go through the information and update the links - No-Link, means that I have not watched it yet.

I was going to put this out on Google+, but they limited me to ... 50 boards.  I thought about putting this on Pinterest, but the videos' would not be of interest to that genre, and twitter is way to short

TODAY is 2016.11.24




OWASP  YouTube channel has roughly  18.5 days (442.5 hours) of video as of TODAY.



Drive it Like You Hacked IT


To Listen - Use HackRF One - Great Scott Gadgets - 1Mhz - 6Ghz - CAN use to Spoff GPS - 1MHz is FM Radio Frequency Range.

RTL-SDR RTL2832U -  SDR (Software Defined Radio)

Planes Circling over LA - FBI planes.

GNU Radio - The Tick Shift of SDR

GQRX - See a waterfall view of the spectrun

SDR# for Windows

Sub Reddit - for RTL-SDR

rtl_fm - command line tool to grab broadcasts


Yard Stick One by Michael Ossmann using rfcat python device to send and receive data.

Mattell IM-ME - uses the TI CC1101 Chipset - BRICKED the Code. . . 

Shows that most Garage Doors can be hacked with Brute Force in 30 min, but that using smart logic you can get it down to just 8 seconds use the De Bruijn Sequence (bit shift register showing the least number of combinations to show all combinations.

SSL MITMA * Raspberry Pi, FONA GSM Board, Mallory (SSL, MITMA), dns spoofing (api.gm.com), iptables, alfa AWUS036h, Edimax Wifi dongle, Pre-Paid SIM card. Hacking CAR.

Very Kool presentation showing how the vulnerabilities of most wireless devices and the TOOLS he used.  He thinks outside of the box




TheSecurityTube's channel  has 525 video's as of TODAY has 6D:11H:59M:40S of video.


Bluetooth // RFID // White Hat ## Reverse Engineering.  Feed Hunting, SCAN for Satellites, and Scan all Frequencies - Visual - Report on Mailing Lists / Forums - Poking around in the DARK on FeedHuntPlaza - EASIER Way to Do it - Visualization is your friend - humans brains like images, recognize food, danger, friends enemies,  Done initially back in the 90's.

Hacking a Bird in The Sky - this guy is Python and hacks 'DreamBox', Linux, GPL Source Code, Cross Compilers, Alternative Firmware * http://www.i-have-a-dreambox.com * IT IS IN GERMAN, and with  a DVB card can access the data from the satellite.  dvbsnoop - DVB & MPEG stream analyzer is like a "WireShark" for DVB and can access the raw data from the DVB card - can decode Known PID's. ** http:/dvbsnop.sourceforge.net ** Allows you to see IP and MAC addresses - the source and destination addresses.  Tunneled into a receiver and does some 3D modeling of his data.

DreamBox 7020 ~$350, 
Dish - $300
Motor & Mount $150
Total ~ $785

http://rfidiot.org    adam@algroup.co.uk

Sell them - NXP PN532 chips to run in emulator mode


DEFCONConference  has 1852 video's as of TODAY and 56D:2H:24:1M.  I was curious, since they have some really interesting stuff - how long it would take me to watch it - without sleeping or eating or going to the bathroom, and it would 2 months.

Explosions & how to destroy drives from 3-Letter-Gov.Agencies.  Just fun to watch and what I learned, is the ONLY, the ONE and ONLY way to destroy the data for all practical purposes  if you really want to destroy the data... - ONLY RUN your systems in Ram.  Otherwise if you are using disk they they WILL get your data. 




The Exploiteers Channel has 5H:2M:51S and 46 video's as of Today.



http://dc22.gtvhacker.com

Free UART adapters - 

Shows you how to hack hardware using most commonly the UART

eMMC (Embedded Multi-Media Card) 


HackersOnBoard Channel has 3000 Video's and has 98D:22H:38M:35S

42:36 HackersOnBoard  Defcon 21 - The Secret Life of SIM Cards

Subscriber Identity Module - Smart cards are designed to be secure.  Designed not to be cloned. 

SIM Apps - Did you know sim cards are actually 8 bit computers?  Not very powerful, but they are computers.  More specifically they are JavaCards.

Sim Alliance Loader - 

GlobalPlatoform is a standard for loading and managing apps on Java Cards

SEEK: Open-Source Android SDK for smart cards.



D.A.G.  Directed Acyclic Graph

init,clone  diff,log,status  add,commit  checkout  branch,merge  push,pull

Init
Clone
 . . . How you start a repository.
# git init

Add
Comit
. . . Getting stuff done
# git add foo
# git commit 
# git status
# git add foo
# git commit
# git diff
# git add foo
# git branch feature
# git checkout feature
# git add  << errors
# git add bar
# git status
# git commit

a Git ID - Content+Author+Date+log+Previous Commit ID
Every ID is Unique
Every Commit is Unique
Commits never change




SecurityTubeCons 1066 video's and 6D:11H:59M:40S to watch them.


How can I be secure knowing that the routers are insecure.



 27:05 Corpse Husband Horrifying Deep Web Stories "Why I Quit Hacking.." (Graphic) A Scary Hacker Story  THIS seems to be a Fictional Story about the Dark Net aka the Deep Web.








No comments:

Post a Comment