Легкие способы получить права админа на рабочем компьютере.
В чужой монастырь со своей флешкой.
#hack #pc #howto #warning
@mts24blog
В чужой монастырь со своей флешкой.
#hack #pc #howto #warning
@mts24blog
Telegraph
Легкие способы получить права админа на рабочем компьютере
Когда ты пpиходишь на работу и обнаруживаешь, что на компьютере что-то запрещено, а в Сети — заблокировано, это воспринимается практически как вызов. В своей статье я расскажу, какие бывают методы ограничений и как с ними бороться. Многие из описанных трюков…
Через USB порт можно не только Винду восстанавливать, но можно еще и хорошо так похулиганить
#pc #hack #intel #взлом #насвойстрахириск
@mts24blog
#pc #hack #intel #взлом #насвойстрахириск
@mts24blog
Telegraph
Хакнуть процессоры Intel можно через USB-порт и отладочный интерфейс [видео]
Специалисты Positive Technologies полагают, что отладочный интерфейс процессоров Intel, который с некоторых пор доступен через порт USB 3.0, позволяет атакующему, при наличии физического доступа к устройству, обойти практически любые защитные механизмы. Отладочный…
Найден способ обхода экрана блокировки на Windows 10 Mobile
http://ylink.pro/b3
Информация о баге появилась на страницах блога Windowsteam 13 февраля 2017 года. Хотя разработчиков Microsoft уже уведомили о проблеме, вряд ли патч для нее появится в этом месяце. Хотя на этот раз компания приняла решение задержать традиционный «вторник обновлений» из-за неких «проблем, возникших в последнюю минуту» (то есть вчера патчи не вышли), ждать исправления для обхода блокировки явно стоит не раньше следующего месяца.
#взлом #winmobile #hack
Есть новость, статья или комментарий? Пришлите нам в чат @mts24chat
http://ylink.pro/b3
Информация о баге появилась на страницах блога Windowsteam 13 февраля 2017 года. Хотя разработчиков Microsoft уже уведомили о проблеме, вряд ли патч для нее появится в этом месяце. Хотя на этот раз компания приняла решение задержать традиционный «вторник обновлений» из-за неких «проблем, возникших в последнюю минуту» (то есть вчера патчи не вышли), ждать исправления для обхода блокировки явно стоит не раньше следующего месяца.
#взлом #winmobile #hack
Есть новость, статья или комментарий? Пришлите нам в чат @mts24chat
Telegraph
Найден способ обхода экрана блокировки на Windows 10 Mobile
Независимый исследователь из Бразилии Уоллас Де Паула (Wallace Da Paula) обнаружил баг, который позволяет обойти блокировку экрана Windows 10 Mobile и получить доступ к галерее устройства. Эксплуатация проблемы не требует каких-либо технических познаний и…
Forwarded from TechToday News
#Hardware #RF #SDR #Hack #Security #Report #Tool
TEMPESTSDR: AN SDR TOOL FOR EAVESDROPPING ON COMPUTER SCREENS VIA UNINTENTIONALLY RADIATED RF
Thanks to RTL-SDR.com reader 'flatflyfish' for submitting information on how to get Martin Marinov's TempestSDR up and running on a Windows system. If you didn't already know by definition "TEMPEST" refers to techniques used by some spy agencies to eavesdrop on electronic equipment via their unintentional radio emissions (as well as via sounds and vibrations). All electronics emit some sort of unintentional RF signals, and by capturing and processing those signals some data can be recovered. For example the unintentional signals from a computer screen could be captured, and converted back into a live image of what the screen is displaying.
TempestSDR is an open source tool that allows you to use any SDR that has a supporting ExtIO (such as RTL-SDR, Airspy, SDRplay, HackRF) to receive the unintentional signal radiation from a screen, and turn that signal back into a live image. This can let you view what is on a screen without any physical connections. If a high gain directional antenna is used then it may be possible to receive images from several meters away as well.
https://www.rtl-sdr.com/tempestsdr-a-sdr-tool-for-eavesdropping-on-computer-screens-via-unintentionally-radiated-rf/
https://github.com/martinmarinov/TempestSDR
https://youtu.be/mBJ6uQZsF9c
https://www.youtube.com/watch?v=AbaV2sWrsZc
https://climateviewer.com/2014/01/18/nsa-tempest-attack-can-remotely-view-computer-cellphone-screen-using-radio-waves/
TEMPESTSDR: AN SDR TOOL FOR EAVESDROPPING ON COMPUTER SCREENS VIA UNINTENTIONALLY RADIATED RF
Thanks to RTL-SDR.com reader 'flatflyfish' for submitting information on how to get Martin Marinov's TempestSDR up and running on a Windows system. If you didn't already know by definition "TEMPEST" refers to techniques used by some spy agencies to eavesdrop on electronic equipment via their unintentional radio emissions (as well as via sounds and vibrations). All electronics emit some sort of unintentional RF signals, and by capturing and processing those signals some data can be recovered. For example the unintentional signals from a computer screen could be captured, and converted back into a live image of what the screen is displaying.
TempestSDR is an open source tool that allows you to use any SDR that has a supporting ExtIO (such as RTL-SDR, Airspy, SDRplay, HackRF) to receive the unintentional signal radiation from a screen, and turn that signal back into a live image. This can let you view what is on a screen without any physical connections. If a high gain directional antenna is used then it may be possible to receive images from several meters away as well.
https://www.rtl-sdr.com/tempestsdr-a-sdr-tool-for-eavesdropping-on-computer-screens-via-unintentionally-radiated-rf/
https://github.com/martinmarinov/TempestSDR
https://youtu.be/mBJ6uQZsF9c
BBC Micro Live, last series, programme 4, 1986-11-14
https://www.youtube.com/watch?v=AbaV2sWrsZc
NSA TEMPEST Attack can remotely view your computer and cell phone screen using radio waves!
https://climateviewer.com/2014/01/18/nsa-tempest-attack-can-remotely-view-computer-cellphone-screen-using-radio-waves/
rtl-sdr.com
TempestSDR: An SDR tool for Eavesdropping on Computer Screens via Unintentionally Radiated RF
Thanks to RTL-SDR.com reader 'flatflyfish' for submitting information on how to get Martin Marinov's TempestSDR up and running on a Windows system. If you didn't already know by definition "TEMPEST" refers to techniques used by some spy agencies to eavesdrop…
Forwarded from TechToday News
#Hack #Security #Report
Hacker Selling Database of 159 Million Clients Leaked from LinkedIn Online
This morning, January 30th 2019, an unknown hacker going by the name of “Andrew” released an online statement through the Pastebin web service, allegedly announcing the hack of 159 million clients belonging to LinkedIn. As a so called “Proof of Concept,” the hacker has released a sample list of 100 clients along with their account login credentials, serving as proof that the leaked data is in fact real – including the credentials of high profile international CEO’s.
Location of Raw Leak:
https://pastebin.com/sXPPyFYk
Location of LinkedIn Database for Sale:
https://rocketr.net/buy/bfd77635ea0a
List of Other Database’s for Sale:
https://pastebin.com/x9ECRdis
Backup from Today’s Leak:
https://roguemedialabs.com/wp-content/uploads/2019/01/sXPPyFYk.pdf
Hacker Selling Database of 159 Million Clients Leaked from LinkedIn Online
This morning, January 30th 2019, an unknown hacker going by the name of “Andrew” released an online statement through the Pastebin web service, allegedly announcing the hack of 159 million clients belonging to LinkedIn. As a so called “Proof of Concept,” the hacker has released a sample list of 100 clients along with their account login credentials, serving as proof that the leaked data is in fact real – including the credentials of high profile international CEO’s.
Location of Raw Leak:
https://pastebin.com/sXPPyFYk
Location of LinkedIn Database for Sale:
https://rocketr.net/buy/bfd77635ea0a
List of Other Database’s for Sale:
https://pastebin.com/x9ECRdis
Backup from Today’s Leak:
https://roguemedialabs.com/wp-content/uploads/2019/01/sXPPyFYk.pdf
Forwarded from TechToday News
This media is not supported in your browser
VIEW IN TELEGRAM
#Hack #iOS
Remotely taking control of an iPhone while charging? more coming... stay tuned!
https://twitter.com/LambdaConcept/status/1092326812905025536
Remotely taking control of an iPhone while charging? more coming... stay tuned!
https://twitter.com/LambdaConcept/status/1092326812905025536
Forwarded from TechToday News
This media is not supported in your browser
VIEW IN TELEGRAM
#Hack #Hardware #Android #iOS #Tool
Bruteforce forensic solution for PIN BackupPIN passcode EFI & patternLock
🔹 iOS Passcode 7.x.x, 8.0-8.1 and Android 4.x, 5.x, 6.x with OTG
🔹 Android PIN/Backup PIN up to 8 digit and Patternlock 4-9 dots
🔹 Several methods of PIN searching (range, popular, mask, date)
🔹 Full standalone device use and configure without PC
🔹 Extension port for future upgrades
🔹 No registration needed
https://xpinclip.com/
Bruteforce forensic solution for PIN BackupPIN passcode EFI & patternLock
🔹 iOS Passcode 7.x.x, 8.0-8.1 and Android 4.x, 5.x, 6.x with OTG
🔹 Android PIN/Backup PIN up to 8 digit and Patternlock 4-9 dots
🔹 Several methods of PIN searching (range, popular, mask, date)
🔹 Full standalone device use and configure without PC
🔹 Extension port for future upgrades
🔹 No registration needed
https://xpinclip.com/