tpx Security ⠠⠵
2.41K subscribers
2.32K photos
103 videos
24 files
3.97K links
Hacking, ciberseguridad e Inteligencia.
Download Telegram
City-Wide IMSI Catcher Detection using a Raspberry Pi

https://seaglass.cs.washington.edu/

#IMSI
First Quantum-Secured Blockchain Technology Tested in Moscow


Quantum computers pose a significant security threat to cryptocurrencies such as Bitcoin. Now a team of Russian scientists has worked out how to secure blockchains using quantum mechanics.




https://www.technologyreview.com/s/608041/first-quantum-secured-blockchain-technology-tested-in-moscow/
La agencia de seguridad más importante de EEUU fue burlada por una joven de 25 años


Una contratista del área de inteligencia de los Estados Unidos, ha sido acusado de filtrar a una organización de noticias información clasificada de la Agencia de Seguridad Nacional (NSA, por sus siglas en inglés) sobre la interferencia de Rusia en las elecciones presidenciales.

Esta mañana el Departamento de Justicia anunció que detuvo a Reality Leigh, una joven de 25 años, que trabajaba en la empresa Pluribus International y había sido contratada para trabajar en las instalaciones de la NSA en Georgia desde el pasado mes de febrero.


https://news.vice.com/es/article/agencia-seguridad-mas-importante-eeuu-burlada-joven-25-anos
How The Intercept Outed Reality Winner
Today, The Intercept released documents on election tampering from an NSA leaker. Later, the arrest warrant request for an NSA contractor named "Reality Winner" was published, showing how they tracked her down because she had printed out the documents and sent them to The Intercept. The document posted by the Intercept isn't the original PDF file, but a PDF containing the pictures of the printed version that was then later scanned in.

The problem is that most new printers print nearly invisibly yellow dots that track down exactly when and where documents, any document, is printed. Because the NSA logs all printing jobs on its printers, it can use this to match up precisely who printed the document.

In this post, I show how.

You can download the document from the original article here. You can then open it in a PDF viewer, such as the normal "Preview" app on macOS. Zoom into some whitespace on the document, and take a screenshot of this. On macOS, hit [Command-Shift-3] to take a screenshot of a window. There are yellow dots in this image, but you can barely see them, especially if your screen is dirty.

http://blog.erratasec.com/2017/06/how-intercept-outed-reality-winner.html
Github #down - martes, 6 de junio de 2017 (GMT-5) -
Github esta vivo !!
EXPOSING CORDLESS PHONE SECURITY WITH A HACKRF

Over on YouTube user Corrosive has been uploading some videos that explore cordless phone security with a HackRF. In his first video Corrosive shows how he’s able to use a HackRF to capture and then replay the pager tones (handset finding feature) for a very cheap VTech 5.8 Gigahertz cordless phone. He uses the Universal Radio Hacker software in Windows.

https://www.youtube.com/watch?v=7CoPUsSglT4
Malware Uses Obscure Intel CPU Feature to Steal Data and Avoid Firewalls

Microsoft's security team has come across a malware family that uses Intel's Active Management Technology (AMT) Serial-over-LAN (SOL) interface as a file transfer tool.

Because of the way the Intel AMT SOL technology works, SOL traffic bypasses the local computer's networking stack, so local firewalls or security products won't be able to detect or block the malware while it's exfiltrating data from infected hosts.

https://www.bleepingcomputer.com/news/security/malware-uses-obscure-intel-cpu-feature-to-steal-data-and-avoid-firewalls/
Spoofing caller-ID is easy with VoLTE (Voice over LTE) tempering with SIP headers, no check whatsoever 😱 #SSTIC
Leaking CellID (geolocation) and IMEI of VoLTE subscribers with a single SIP INVITE request #Privacy
Node.fz: fuzzing the server-side event-driven architecture
Node.fz: Fuzzing the server-side event-driven architecture Davis et al., EuroSys’17

This paper provides a fascinating look at common causes of concurrency bugs in server-side event driven architecture (EDA) based applications. By far the most popular framework supporting this style is Node.js of course.

"The Node.js package ecosystem, npm, is the largest ever, with over 400,000 packages and over 1.75 billion package downloads per week. Node.js has been deployed in industry, including at eBay, PayPal, and LinkedIn, and is also being embraced on IoT platforms including Cylon.js and IBM’s Node-Red."


https://blog.acolyer.org/2017/06/09/node-fz-fuzzing-the-server-side-event-driven-architecture/
En el curso en línea de #HackingWindows se hace uso de las herramientas liberadas de la NSA + empire + metasploit !! cursos@tpx.mx
+++ ++++ + + + ++ +++++ ++ ++ + + + + + +
+ Aquí ya somos más de 1006 ! ++
+ Gracias por seguirnos en telegram !! ++
+++ ++++ + + + ++ +++++ ++ ++ + ++++++ +
* * *
*|_*|_*|*_ c[ÏIIÏ]
.-' |* |* |*| '-.
|`-...................-'| c[ÏÏÏ]
| tpx Security |
\ _ .-. .-._.-. _ /
,-|'-' '-' '- ' '-'|-,
/` \._ _./ `\
'._ """""""""" _.'
—— ''--.......--''

Gracias -
^— - Es un pastel !!
|__ Creo...
Jean E. Sammet, the American computer scientist who developed the FORMAC programming language and was the first woman to serve as President of ACM, passed away May 21 at the age of 89.

http://www.i-programmer.info/news/82-heritage/10811-jean-sammet.html