|Webtunnel|
🧅Все те, кто хотел пощупать HPTTPT(репа на гитхабе) в связке с луковичной маршрутизацией(конкретно для Tor-мостов), наконец вышло пригодная для использования версия Webtunnel. Webtunnel - это PT(pluggable transport) для мостов Tor, который основывается на HTTPT(прокси-сервер, помогает при обходе цензуры при помощи повсеместного распространения протокола HTTPS, помогая сливаться с "обычным" интернет-трафиком). То есть, для противостояния цензуры происходит имитация HTTPS-трафика. Важно заметить, что на одном IP-адресе, можно поднять сразу и WebTunnel и extor-static-cookie и Snowflake и остальные PTs, то есть ничто не мешает сразу у себя держать и Snowflake и WebTunnel.
🧅All those who wanted to feel HPTTPT(github repo) in conjunction with onion routing (specifically for Tor bridges), finally came out a usable version of Webtunnel. Webtunnel is a PT (pluggable transport) for Tor bridges, which is based on HTTPT (a proxy server that helps in circumventing censorship with the ubiquity of the HTTPS protocol, helping to merge with "normal" Internet traffic). That is, to counter censorship, HTTPS traffic is simulated. It is important to note that on the same IP address, you can immediately raise both WebTunnel and extor-static-cookie and Snowflake and the rest of the PTs, that is, nothing prevents you from keeping both Snowflake and WebTunnel at once.
#anonymity #Anti_Censorship #Tor #PT #bridge #HTTPT #HTTPS #Replay_Attack_Protection #ProbeResistant_Proxies
🧅Все те, кто хотел пощупать HPTTPT(репа на гитхабе) в связке с луковичной маршрутизацией(конкретно для Tor-мостов), наконец вышло пригодная для использования версия Webtunnel. Webtunnel - это PT(pluggable transport) для мостов Tor, который основывается на HTTPT(прокси-сервер, помогает при обходе цензуры при помощи повсеместного распространения протокола HTTPS, помогая сливаться с "обычным" интернет-трафиком). То есть, для противостояния цензуры происходит имитация HTTPS-трафика. Важно заметить, что на одном IP-адресе, можно поднять сразу и WebTunnel и extor-static-cookie и Snowflake и остальные PTs, то есть ничто не мешает сразу у себя держать и Snowflake и WebTunnel.
🧅All those who wanted to feel HPTTPT(github repo) in conjunction with onion routing (specifically for Tor bridges), finally came out a usable version of Webtunnel. Webtunnel is a PT (pluggable transport) for Tor bridges, which is based on HTTPT (a proxy server that helps in circumventing censorship with the ubiquity of the HTTPS protocol, helping to merge with "normal" Internet traffic). That is, to counter censorship, HTTPS traffic is simulated. It is important to note that on the same IP address, you can immediately raise both WebTunnel and extor-static-cookie and Snowflake and the rest of the PTs, that is, nothing prevents you from keeping both Snowflake and WebTunnel at once.
#anonymity #Anti_Censorship #Tor #PT #bridge #HTTPT #HTTPS #Replay_Attack_Protection #ProbeResistant_Proxies
👍3
HTTPT.pdf
196.9 KB
🌐HTTPT: A Probe-Resistant Proxy
#anonymity #Anti_Censorship #HTTPT #HTTPS #Replay_Attack_Protection #ProbeResistant_Proxies
#anonymity #Anti_Censorship #HTTPT #HTTPS #Replay_Attack_Protection #ProbeResistant_Proxies
👍4
Forwarded from Private Shizo
🔥BlueTrust, goodbye to Bluetooth privacy
BlueTrust is a new Bluetooth attack technique developed by Tarlogic that allows to determine which devices have been previously paired and if they still maintain a trusted relationship. It arises from an evolution of the BIAS and KNOB attacks.
BlueTrust leverages the ability to spoof device characteristics and bypass the authentication phase of a connection to study the responses received to different probing messages. In this way, information about devices and their users can be inferred, such as whether a device is paired with the impersonated device. Pairing networks can be traced to determine which user each device belongs to, among other useful data.
📰Galician county Tarlogic found a security flaw in Bluetooth technology
📰‘Open’ mobile phones blocked via Bluetooth: experts from Tarlogic, a Spanish cybersecurity company, share use cases for their BlueTrust solution
📰Cybercriminals can use the bluetooth of your mobile to steal information without you knowing it.
BlueTrust is a new Bluetooth attack technique developed by Tarlogic that allows to determine which devices have been previously paired and if they still maintain a trusted relationship. It arises from an evolution of the BIAS and KNOB attacks.
BlueTrust leverages the ability to spoof device characteristics and bypass the authentication phase of a connection to study the responses received to different probing messages. In this way, information about devices and their users can be inferred, such as whether a device is paired with the impersonated device. Pairing networks can be traced to determine which user each device belongs to, among other useful data.
📰Galician county Tarlogic found a security flaw in Bluetooth technology
📰‘Open’ mobile phones blocked via Bluetooth: experts from Tarlogic, a Spanish cybersecurity company, share use cases for their BlueTrust solution
📰Cybercriminals can use the bluetooth of your mobile to steal information without you knowing it.
👍4❤1
CSI_IoT_Forensics.pdf
761.9 KB
🕵️♂️Collecting Channel State Information in Wi-Fi Access Points for IoT Forensics.
#DFIR #forensics #physical_layer #IoT #WiFi_AP #CSI #CSI_Sniffer #ISP
#DFIR #forensics #physical_layer #IoT #WiFi_AP #CSI #CSI_Sniffer #ISP
👍2
Forwarded from Private Shizo
📲Detect the target user's iPhone system version through signaling
Apple:
We’re unable to identify a security issue in your report.
We reviewed your report and were unable to identify a security issue.
📡LTE base station with limesdr
📡Complete Open Source LTE Base Station (eNB) Software
📡Stuff for srsLTE IMSI catcher
📡Open source SDR 4G software suite from Software Radio Systems
📡FALCON - Fast Analysis of LTE Control channels
📡LTESniffer - An Open-source LTE Downlink/Uplink Eavesdropper
Apple:
We’re unable to identify a security issue in your report.
We reviewed your report and were unable to identify a security issue.
📡LTE base station with limesdr
📡Complete Open Source LTE Base Station (eNB) Software
📡Stuff for srsLTE IMSI catcher
📡Open source SDR 4G software suite from Software Radio Systems
📡FALCON - Fast Analysis of LTE Control channels
📡LTESniffer - An Open-source LTE Downlink/Uplink Eavesdropper
👍3😁3❤2
Private Shizo
📲Detect the target user's iPhone system version through signaling Apple: We’re unable to identify a security issue in your report. We reviewed your report and were unable to identify a security issue. 📡LTE base station with limesdr 📡Complete Open Source…
Network Signal Guru_4.5.3.apk
21.5 MB
🌐Network Signal Guru
Permissions:
📲
(fe75ad6d617d65508ce2088e580a6ae14d9b2b8fa98a16ba80caea44d88969aa)
#security #cellularCommunication #wireless #Android #RF #GSM #GPRS #EDGE #UMTS #HSDPA #HSUPA #CDMA2000 #EVDO #LTE #5G
Permissions:
📲
android.hardware.wifi
📲android.hardware.telephony
📲android.hardware.location
📲android.permission.INTERNET
📲android.permission.WRITE_EXTERNAL_STORAGE
📲android.permission.ACCESS_FINE_LOCATION
📲android.permission.ACCESS_COARSE_LOCATION
📲android.permission.ACCESS_WIFI_STATE
📲android.permission.ACCESS_NETWORK_STATE
📲android.permission.FOREGROUND_SERVICE
📲android.permission.READ_PHONE_STATE
📲android.permission.POST_NOTIFICATIONS
📲com.android.vending.BILLING
📲android.hardware.location.network
📲android.hardware.location.gps
🧬VT(fe75ad6d617d65508ce2088e580a6ae14d9b2b8fa98a16ba80caea44d88969aa)
#security #cellularCommunication #wireless #Android #RF #GSM #GPRS #EDGE #UMTS #HSDPA #HSUPA #CDMA2000 #EVDO #LTE #5G
❤1👍1🔥1
Forwarded from Private Shizo
📲Intercepting My Own 2G GSM Phone Call On A Real Cellular Network!
So here is a quick video of how a GSM voice call is intercepted using DragonOS linux, a software defined radio and gr-gsm.
So here is a quick video of how a GSM voice call is intercepted using DragonOS linux, a software defined radio and gr-gsm.
👍4👏2
CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF
817.2 KB
🛡Defending Continuous Integration/Continuous Delivery (CI/CD) Environments
#security #CI_CD #DevSecOps #CSI #NSA #CISA
#security #CI_CD #DevSecOps #CSI #NSA #CISA
👍2❤1
Forwarded from 0•Bytes•1
Всем здравствуйте, не желайте пирожок, или может выпить из бутылька?🥐
Hello everyone, would you like a pie, or maybe a drink from the bottle? 🥐
Я все еще пишу статью про air gap. Но чтобы не оставлять вас без интересного контента я сделала небольшой сборник инструментов по анти-форензике и не только.Русская версия
Hello everyone, would you like a pie, or maybe a drink from the bottle? 🥐
I'm still writing the air gap article. But not to leave you without interesting content I made a little compilation of tools on anti-forensics and not only.English version
Telegraph
Небольшой сборник инструментов
Я решила сделать небольшой сборник инструментов по анти-форензике и не только.⚒ Ведь я люблю своих подписчиков и не хочу чтобы канал пустовал пока я веду работу над большой статьей.❤️ Ну что пройдем в кроличью нору Алиса?🎀 f-forensic 📚 Простенькое введение…
👍5👏1