Still love my mix for @radiofm4 from last year https://soundcloud.com/barbnerdy/lets-go-dancing-la-boum-de-luxe-2017 … Trap, Wave, Jungle, Halftime it’s all about the BASS —> #earcandy #shamelessselfpromotion
The HackCUBE is a small sized (8.5cm^3) and battery powered SDR cube box. It integrates Raspberry Pi, Arduino, 2.4/5.8G Wifi and HID etc, and can externally be connected with some SDR hardware, such as HackRF, RTL-SDR, CC2541 etc. The whole system (without external accessories) will be equal to Unicorn HackID Plus (RFID read/write/emulator) + Wifi Pineapple + rfcat (Sub-GHz transceiver). It can provide comprehensive and powerful wireless hacking capability.
I already explained the basics of Bluetooth technology in my first article in this series, and even showed off how Elliot used Bluetooth hacking in Mr. Robot. In this article, we will examine the use of the MultiBlue Dongle.
This dongle is capable of connecting to any Bluetooth device and enabling you to use your computer keyboard to control the device. Ostensibly developed and sold to enable users to use their computer keyboard and mouse on their mobile device, as you can imagine, it can be used for more surreptitious activities. It's available from many retailers including Amazon.com for about $35
In this tutorial, we will need physical access to the device, but as we expand and deepen your knowledge of Bluetooth, we will work toward using this dongle to control Bluetooth devices without physical access.
Although Bluetooth is limited to 10-100 meters, that is more than enough to cover most homes, neighborhoods, offices, libraries, schools, coffee shops, etc. With an antenna, this range can be extended. Now let's see how to connect to an Android device and control it via your computer keyboard.
Wapiti allows you to audit the security of your websites or web applications.
It performs "black-box" scans (it does not study the source code) of the web application by crawling the webpages of the deployed webapp, looking for scripts and forms where it can inject data.
UBIT Wien on Twitter: "@leyrer Wie würden Sie Prognose formulieren bzw. was wäre Ihre Formulierung?"
UBIT-Chef Alfred Harl: "Informatiker haben quasi eine Jobgarantie fürs Leben" /cc @UBIT_Wien
Luckily the AT interface is well documented, so it was just a matter of writing a teensy sketch that could read the open-collector clocked data and turn it into USB HID messages. The commands to the keyboard to set the LEDs work, but seem slightly flaky.
This specification describes how DNS SRV records, DNS TXT records, and well-known URIs can be used together or separately to locate CalDAV (Calendaring Extensions to Web Distributed Authoring and Versioning (WebDAV)) or CardDAV (vCard Extensions to WebDAV) services.
Our kickass setup will allow us to do a series of cool things related to daily development operations:
Two Factor Authentication
PAM Authentication (logging into your linux/mac PC)
GPG mail and GIT commit signing/encrypting
SSH AuthenticationWRT1900ACS
Mesh Networking for RF24Network
The following package is meant to provide an easy way to regularly measure your internet connection speed and create some stats. You can easily set up this script on a raspberry pi with raspbian and keep it running in the background.
The data can be used to confront your ISP if your speed is way below the promised speed.
For setting up the machine you need a linux machine because ansible does not run on windows.
So how do we conceal the port properly? Luckily, IPtables has the --reject-with tcp-reset option that can be used in conjunction with the REJECT target in order to specify that connection requests should be handled using TCP RST, just like a connection to an unused port would be treated.