Digital Security
Knowledge of Security is Paramount to everyone in this Digital Age, and many people are not aware of the security threats that are in the digital world. We fear a spider more than a link, but a link can hurt us far more, if we do not take precautions.
An ounce of prevention is worth a pound of cure. ~ Benjamin Franklin.
You can only stop what you know. If you are unaware that it can happen, then you are vulnerable.
Were do you learn about Digital Security? From those who do security, and you can get a YouTube-PHD while watching and learning about what can protect you from harm.
What you will find below is my notes as I go through the information and update the links - No-Link, means that I have not watched it yet.
I was going to put this out on Google+, but they limited me to ... 50 boards. I thought about putting this on Pinterest, but the videos' would not be of interest to that genre, and twitter is way to short
TODAY is 2016.11.24
YouTube channel has roughly 18.5 days (442.5 hours) of video as of TODAY.
Drive it Like You Hacked IT
To Listen - Use HackRF One - Great Scott Gadgets - 1Mhz - 6Ghz - CAN use to Spoff GPS - 1MHz is FM Radio Frequency Range.
RTL-SDR RTL2832U - SDR (Software Defined Radio)
Planes Circling over LA - FBI planes.
GNU Radio - The Tick Shift of SDR
GQRX - See a waterfall view of the spectrun
SDR# for Windows
Sub Reddit - for RTL-SDR
rtl_fm - command line tool to grab broadcasts
Yard Stick One by Michael Ossmann using rfcat python device to send and receive data.
Mattell IM-ME - uses the TI CC1101 Chipset - BRICKED the Code. . .
Shows that most Garage Doors can be hacked with Brute Force in 30 min, but that using smart logic you can get it down to just 8 seconds use the De Bruijn Sequence (bit shift register showing the least number of combinations to show all combinations.
SSL MITMA * Raspberry Pi, FONA GSM Board, Mallory (SSL, MITMA), dns spoofing (api.gm.com), iptables, alfa AWUS036h, Edimax Wifi dongle, Pre-Paid SIM card. Hacking CAR.
Very Kool presentation showing how the vulnerabilities of most wireless devices and the TOOLS he used. He thinks outside of the box
Bluetooth // RFID // White Hat ## Reverse Engineering. Feed Hunting, SCAN for Satellites, and Scan all Frequencies - Visual - Report on Mailing Lists / Forums - Poking around in the DARK on FeedHuntPlaza - EASIER Way to Do it - Visualization is your friend - humans brains like images, recognize food, danger, friends enemies, Done initially back in the 90's.
Hacking a Bird in The Sky - this guy is Python and hacks 'DreamBox', Linux, GPL Source Code, Cross Compilers, Alternative Firmware * http://www.i-have-a-dreambox.com * IT IS IN GERMAN, and with a DVB card can access the data from the satellite. dvbsnoop - DVB & MPEG stream analyzer is like a "WireShark" for DVB and can access the raw data from the DVB card - can decode Known PID's. ** http:/dvbsnop.sourceforge.net ** Allows you to see IP and MAC addresses - the source and destination addresses. Tunneled into a receiver and does some 3D modeling of his data.
DreamBox 7020 ~$350,
Dish - $300
Motor & Mount $150
Total ~ $785
http://rfidiot.org adam@algroup.co.uk
Sell them - NXP PN532 chips to run in emulator mode
has 1852 video's as of TODAY and 56D:2H:24:1M. I was curious, since they have some really interesting stuff - how long it would take me to watch it - without sleeping or eating or going to the bathroom, and it would 2 months.
53:09 DEF CON 23 - Zoz - And That's How I Lost My Other Eye...Explorations in Data Destruction (Fixed)
Explosions & how to destroy drives from 3-Letter-Gov.Agencies. Just fun to watch and what I learned, is the ONLY, the ONE and ONLY way to destroy the data for all practical purposes if you really want to destroy the data... - ONLY RUN your systems in Ram. Otherwise if you are using disk they they WILL get your data.
1:00:06 DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse
45:31 DEFCONConference DEF CON 23 - Samy Kamkar - Drive it like you Hacked it: New Attacks and Tools to Wireles
48:50 The Exploiteers Hack All The Things: 20 Devices in 45 Minutes
http://dc22.gtvhacker.com
Free UART adapters -
Shows you how to hack hardware using most commonly the UART
eMMC (Embedded Multi-Media Card)
Channel has 3000 Video's and has 98D:22H:38M:35S
42:36 HackersOnBoard Defcon 21 - The Secret Life of SIM Cards
Subscriber Identity Module - Smart cards are designed to be secure. Designed not to be cloned.
Subscriber Identity Module - Smart cards are designed to be secure. Designed not to be cloned.
SIM Apps - Did you know sim cards are actually 8 bit computers? Not very powerful, but they are computers. More specifically they are JavaCards.
Sim Alliance Loader -
GlobalPlatoform is a standard for loading and managing apps on Java Cards
SEEK: Open-Source Android SDK for smart cards.
D.A.G. Directed Acyclic Graph
init,clone diff,log,status add,commit checkout branch,merge push,pull
Init
Clone
. . . How you start a repository.
# git init
Add
Comit
. . . Getting stuff done
# git add foo
# git commit
# git status
# git add foo
# git commit
# git diff
# git add foo
# git branch feature
# git checkout feature
# git add << errors
# git add bar
# git status
# git commit
a Git ID - Content+Author+Date+log+Previous Commit ID
Every ID is Unique
Every Commit is Unique
Commits never change
How can I be secure knowing that the routers are insecure.
27:05 Horrifying Deep Web Stories "Why I Quit Hacking.." (Graphic) A Scary Hacker Story THIS seems to be a Fictional Story about the Dark Net aka the Deep Web.