Cybred
9.55K subscribers
391 photos
34 videos
100 files
603 links
Download Telegram
Cy_Xplorer_2023.pdf
17.7 MB
When bits turn to blackmail: navigating the ecosystem of cyber extortion and ransomware
Самая большая подборка видео, посвященных поиску и эксплуатации уязвимостей в современных автомобильных системах. В системах бесключевого доступа (когда ты с помощью брелка можешь открыть двери, багажник или запустить двигатель), мультимедийных системах и сигнализациях. Некоторые из них могут помочь реализовать слежку за владельцем машины, угнать его автомобиль или устроить аварию.

Bluetooth Low Energy Link Layer Relay Attack on a Tesla
CANSECWEST 2021: Tbone Drone vs Tesla
I Hacked Into My Own Car
COSIC researchers hack Tesla Model X key fob
Analysis and Defense of Automotive Networks
Phantom of the ADAS: Phantom Attacks on Driving Assistance Systems
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars
Thieves caught using keyless hack to steal £90,000 Tesla in 30 seconds
What REALLY happens when you sync your phone in a car
Exploiting fitted car alarms that have insecure apps
Car Infotainment Hacking Methodology, Attack Surfaces
Def Con 26 Car Hacking Village - CANT Tool
vRS Rolling Code bypass preview
Tesla Model X Hack
Elon Musk's view on Automotive Cyber-security
Tesla CAN bus data logging
How to steal a Tesla? (Uses fake WiFi hotspot and apps.)
Canspy: A Platform for Auditing Can Devices
Andy Davis & David Claire - Vehicle cyber security and innovative assessment techniques
Ken Munro & Dave Lodge - Hacking the Mitsubishi Outlander & IOT
Car Hacking Research: Remote Attack Tesla Motors by Keen Security Lab
DEF CON 24 - Jianhao Liu, Chen Yan, Wenyuan Xu - Can You Trust Autonomous Vehicles?
CAN Denial-of-Service Attack Demo on the Giulietta
CANtact: An Open Tool for Automotive Exploitation
State Of Automotive Cyber Safety - IATC - Joshua Corman
Hacking a Car with an Ex-NSA Hacker: CYBERWAR
Car Hacking Research: Remote Attack Tesla Motors by Keen Security Lab
Hacking the Mitsubishi Outlander PHEV SUV
The Current State of Automotive Security
High-tech car theft: How to hack a car (CBC Marketplace)
SAE Cyber Auto Challenge Webinar
README 1st - Open Garages
DEF CON 23 - Vehicle Hacking Village - Josh Corman - Safer Sooner Automotive Cyber Safety
DEF CON 23 - Samy Kamkar - Drive it like you Hacked it: New Attacks and Tools to Wireless
DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S
DEF CON 23 - Vehicle Hacking Village - Eric Evenchick - SocketCAN
DEF CON 23 - Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger Vehicle
Ford Focus ECU fuzzing at DEFCON 23 Car Hacking Village
IATC - State of Automotive Cyber Safety - Josh Corman
OwnStar - hacking cars with OnStar to locate, unlock and remote start vehicles
Glitch allows hackers to control your car
Hackers Remotely Kill a Jeep on the Highway—With Me in It
Hopping on the CAN Bus introduces CANard by Eric Evenchick at Black Hat Asia 2015
Car Hacking by UCSD
DEF CON 22 - Charlie Miller & Chris Valasek - A Survey of Remote Automotive Attack Surfaces
Car Automation with your Android Phone: OBDLink LX
2014 Connected Car Expo: Automotive Cybersecurity: A frank discussion.
Another Korean car hacking demo.
Black Hat USA 2014 - Embedded: A Survey of Remote Automotive Attack Surfaces
Your car is a giant computer - and it can be hacked
How to Hack a Car: Phreaked Out
Vehicle Forensics - The Data Beyond the Dashboard
Mazda RX8 CAN bus control demo of the instrument cluster
DEF CON 21 - Charlie Miller and Chris Valasek - Adventures in Automotive Networks and Control Units
Ford wants you to join it in hacking car software and hardware
Two experts demonstrate carjacking gone digital
Automotive Consortium for Embedded Security
Digital Carjackers Show Off New Attacks
Decoding CAN bus frames on a Toyota internal bus with SocketCAN and Linux
Luxury car theft
Malicious App to Control a Car (Korean)
DARPA PM Kathleen Fisher, High Assurance Systems
iDriver - iPhone remote controlled car
https://github.com/cure53/HTTPLeaks/

This project aims to enumerate all possible ways, a website can leak HTTP requests. In one single HTML file.

Для эксфильтрации данных в обход CSP
BRUTEPRINT_Expose_Smartphone_Fingerprint.pdf
3.4 MB
Описание работы двух зиродеев от китайцев, позволяющих брутить и митмить отпечатки пальцев на смартфонах.
https://www.imdb.com/title/tt2201890/
magnet:?xt=urn:btih:6A4245BFAAFE9E3DEC4BC62078187504090619C0

Первый сериал снятый в скринлайфе про варез, релизные группы и ФБР. Без нелепых хацкеров в капюшонах, вполне смотрибельный и сегодня.
https://hackcompute.com/hacking-epp-servers/

Исследователи копнули в сторону EPP-протокола, по которому регистраторы доменов общаются с ccTLD-реестрами, и смогли скомпрометировать EPP-сервера, а вместе с ними и захватить зоны .ai, .bj, .bw, .ci, .gl, .ke, .kn, .lb, .ly, .mr, .ms, .mz, .ng, .py, .rw, .so, .ss, .td, .zm, благодаря багам, что им удалось там найти.