Your machine (mobile phone, bluetooth device, router etc etc) may betrayed you and can be used to detect your position or even invade your privacy. They are watching you, stay alert.
Shodan is basically a search engine which helps to find (routers, switches, Scada etc.) mainly vulnerable systems on the internet .It is widely known as Google for hackers
It was launched in 2009 by computer programmer John Matherly. It is mainly a search engine of service banners in which metadata (data about data) is sent from the server to client. Shodan currently probes for 50+ ports.
Shodan is basically a search engine which helps to find (routers, switches, Scada etc.) mainly vulnerable systems on the internet .It is widely known as Google for hackers
It was launched in 2009 by computer programmer John Matherly. It is mainly a search engine of service banners in which metadata (data about data) is sent from the server to client. Shodan currently probes for 50+ ports.
The economics is the best way to view attacker and defender strategies. The traditional approach to defense is to raise the cost for your attackers by making attacks as difficult as possible. This, unfortunately, has a tendency to raise costs for the defender and their users too and does not scale well.
High Definition Fuzzing; Exploring HDMI vulnerabilitiesE Hacking
Most modern Android-based phones and tablets have a Slimport(r) connection that supports HDMI-CEC like Samsung and HTC among mobile devices, and many JVC, Kenwood, Panasonic, and Sony car stereos and other 750 million devices in the world so far.
Exploiting Linux On 32-bit and 64-bit SystemsE Hacking
Dr. Hector Marco-Gisbert & Dr. Ismael Ripoll presented new techniques for exploiting the Linux, using its weaknesses.
http://www.ehacking.net/2016/06/exploiting-linux-on-32-bit-and-64-bit.html
The most important steps to become a hacker have been revealed. Learn the steps that are highly required to become a information security professional.
http://academy.ehacking.net/blog/125408/tips-to-become-a-hacker
Penetrating the Perimeter - Tales from the BattlefieldE Hacking
Presentation and demonstration by Phil Grimes at Central Ohio Infosec Summit 2016.
Read more about it:
http://www.ehacking.net/2016/05/penetrating-perimeter-tales-from.html
Finding ways to fingerprint the websites on tor project. Read more and see the video: http://www.ehacking.net/2016/02/website-fingerprinting-on-tor-attacks.html
The tool has been developed to be used inside a Linux environment. At the host system level, the only prerequisites are support for Python 2,7 or higher and the Android SDK.
Advanced Persistent Threat (APT) attacks are highly organised and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns.
Bluetooth is watching you, bluetooth is everywhere and they are tracking your every move. Learn how to detect the surveillance system. For hacking, for fun and for privacy.
Unmasking is the process to remove mask from the face and to reveal the real identity; at defcon17, Robert “RSnake” Hansen & Joshua “Jabra” Abraham have discussed the concept with demonstration
Sir I want to hack whatsapp chat ? Please give me a tutorial link. This question made me to write this simple POC tutorial to hack/steal whatsapp chats
http://www.ehacking.net/2014/09/poc-tutorial-of-stealing-whatsapp-chat.html
Presented by JP Dunning “.ronin” BlackHat Asia 2014; Demonstration of how to build a hardware based trojan at home. Create your own hardware of Trojan Virus. http://www.ehacking.net/2014/09/building-trojan-hardware-at-home.html
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
This whitepaper discusses how social media monitoring tools can be applied as powerful and cost effective Open Source Intelligence (OSINT) platforms; and how they can support collection and analysis of relevant and targeted information relating to counter-terrorism, criminal and political open sources.
LDAP Services are a key component
in companies. The information stored in them
is used for corporate applications. If one of these
applications accepts input from a client and
execute it without first validating it, attackers h
ave the potential to execute their own
queries and thereby extract sensitive information f
rom the LDAP directory. In this paper a
deep analysis of the LDAP injection techniques is p
resented including Blind attacks
The objective of this course material is to demonstrate reverse engineering and malware analysis, malware analysis is very helpful in penetration testing and vulnerability assessment.
The purpose of this document
is not to show how to use Metasploit tool there are enormous amount of sources available to do that but to show you how to look deeper into the code and try to decipher how the various classes and modules hang
together to produce the various functions we love to use.
In doing so we will learn how the exploit framework could be structured, how the interaction between the
attacker and the exploited vulnerability could be
achieved and how the user can extend the functionality of Metasploit.
The economics is the best way to view attacker and defender strategies. The traditional approach to defense is to raise the cost for your attackers by making attacks as difficult as possible. This, unfortunately, has a tendency to raise costs for the defender and their users too and does not scale well.
High Definition Fuzzing; Exploring HDMI vulnerabilitiesE Hacking
Most modern Android-based phones and tablets have a Slimport(r) connection that supports HDMI-CEC like Samsung and HTC among mobile devices, and many JVC, Kenwood, Panasonic, and Sony car stereos and other 750 million devices in the world so far.
Exploiting Linux On 32-bit and 64-bit SystemsE Hacking
Dr. Hector Marco-Gisbert & Dr. Ismael Ripoll presented new techniques for exploiting the Linux, using its weaknesses.
http://www.ehacking.net/2016/06/exploiting-linux-on-32-bit-and-64-bit.html
The most important steps to become a hacker have been revealed. Learn the steps that are highly required to become a information security professional.
http://academy.ehacking.net/blog/125408/tips-to-become-a-hacker
Penetrating the Perimeter - Tales from the BattlefieldE Hacking
Presentation and demonstration by Phil Grimes at Central Ohio Infosec Summit 2016.
Read more about it:
http://www.ehacking.net/2016/05/penetrating-perimeter-tales-from.html
Finding ways to fingerprint the websites on tor project. Read more and see the video: http://www.ehacking.net/2016/02/website-fingerprinting-on-tor-attacks.html
The tool has been developed to be used inside a Linux environment. At the host system level, the only prerequisites are support for Python 2,7 or higher and the Android SDK.
Advanced Persistent Threat (APT) attacks are highly organised and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns.
Bluetooth is watching you, bluetooth is everywhere and they are tracking your every move. Learn how to detect the surveillance system. For hacking, for fun and for privacy.
Unmasking is the process to remove mask from the face and to reveal the real identity; at defcon17, Robert “RSnake” Hansen & Joshua “Jabra” Abraham have discussed the concept with demonstration
Sir I want to hack whatsapp chat ? Please give me a tutorial link. This question made me to write this simple POC tutorial to hack/steal whatsapp chats
http://www.ehacking.net/2014/09/poc-tutorial-of-stealing-whatsapp-chat.html
Presented by JP Dunning “.ronin” BlackHat Asia 2014; Demonstration of how to build a hardware based trojan at home. Create your own hardware of Trojan Virus. http://www.ehacking.net/2014/09/building-trojan-hardware-at-home.html
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
This whitepaper discusses how social media monitoring tools can be applied as powerful and cost effective Open Source Intelligence (OSINT) platforms; and how they can support collection and analysis of relevant and targeted information relating to counter-terrorism, criminal and political open sources.
LDAP Services are a key component
in companies. The information stored in them
is used for corporate applications. If one of these
applications accepts input from a client and
execute it without first validating it, attackers h
ave the potential to execute their own
queries and thereby extract sensitive information f
rom the LDAP directory. In this paper a
deep analysis of the LDAP injection techniques is p
resented including Blind attacks
The objective of this course material is to demonstrate reverse engineering and malware analysis, malware analysis is very helpful in penetration testing and vulnerability assessment.
The purpose of this document
is not to show how to use Metasploit tool there are enormous amount of sources available to do that but to show you how to look deeper into the code and try to decipher how the various classes and modules hang
together to produce the various functions we love to use.
In doing so we will learn how the exploit framework could be structured, how the interaction between the
attacker and the exploited vulnerability could be
achieved and how the user can extend the functionality of Metasploit.
4. •Nevsky Prospect, 114, Saint Petersburg
•Prospekt Medikov, St Petersburg
•Ulitsa 8 Marta, 41, Yekaterinburg
@glennzw
•P132, Kaluzhskaya
5. •North 16th Street, Philadelphia, USA
•Captain Cook Drive, Australia
•Trillerpark, 1210 Viena, Austria
•3 Luvianpuistokatu, Satakunta, Finland
@glennzw
6. @glennzw
•Wingate by Wyndham, Dallas, Texas, USA
•Hotel Strata, California, USA
•Hotel Hacienda, Spain
•Sunrise Diamond Beach Resort, Egypt
•5Footway Inn, Singapore
•H2O Hostel Ljubljana, Slovenia
32. @glennzw
BTHomeHub-AFV1, are you there?
Starbucks, are you there?
Virgin-AFVT, are you there?
Is anyone out there?
Hey iPhone! It’s me, Starbucks!
98:03:ab:32:11:33