this actually kind of looks fun in a way despite it shows a small team of dedicated people can cause major disruption across a wide area
Nice Raspberry Pi.
Guy I know is doing research on preventing this sort of thing. Something to do with making the control software recognise spoofed sensor readings
Neat
I love seeing stories like this. Tales from penetration testing organizations are usually hilarious but also really interesting.
If you like this there are books that are pretty much just compilations of hacker stories like this.
The scariest thing is that these guys are considered to be skiddies with them using things like the Pineapple and rubber ducky.
I mean, it's basically next level skid shit. Like, a script kiddie who isn't afraid to leave his house, has a car, and can afford to buy a raspberry pi. They're just using premade tools, no real interesting reverse engineering going on here.
And any RFID security card that can be cloned with an RFID cloner is increeeeeeeedbily poorly designed and missing the whole point of what RFID should be used for in security..
Seeing what a bunch of fat dudes in camo can do, it scares the shit out me what a military team could do to another nation's infrastructure and defence systems.
What's the deal with the MOLLE vests and helmets lmao
Reminds me of this guy
[img]http://i.imgur.com/dtWAGbU.png[/img]
[QUOTE=Killuah;50349500][img]http://i.imgur.com/fv9EA5l.jpg[/img][/QUOTE]
He's executing commands on the remote computer though, it's not just the local command prompt. :v:
[editline]19th May 2016[/editline]
He even explained it as they were showing it
[QUOTE=Skipcast;50351054]He's executing commands on the remote computer though, it's not just the local command prompt. :v:
[editline]19th May 2016[/editline]
He even explained it as they were showing it[/QUOTE]
Did you look at the screenshot? The whole point of it was to show that he fucked up the echo, that's it. You're looking way too into it.
[QUOTE=RapistSanta;50350044]Reminds me of this guy
[img]http://i.imgur.com/dtWAGbU.png[/img][/QUOTE]
He's totally right. It'd be surprisingly easy to lead a campaign of sheer economic and political terror on the US (or any other country, for that matter) without needing to hurt anybody.
The fact that nobody has gone through with it (knock on wood) is mindblowing.
[QUOTE=RapistSanta;50350044]Reminds me of this guy
[img]http://i.imgur.com/dtWAGbU.png[/img][/QUOTE]
Anyone know of good fiction based on this/OP video? This kind of stuff is fascinating to me.
You guys who complain of them using pre made scripts or programs need to realize that they probably don't want to reinvent the wheel when stuff already exists for this kind of work.
[QUOTE=Zillamaster55;50351182]He's totally right. It'd be surprisingly easy to lead a campaign of sheer economic and political terror on the US (or any other country, for that matter) without needing to hurt anybody.
The fact that nobody has gone through with it (knock on wood) is mindblowing.[/QUOTE]
You don't even need to leave your house (even if it'd be easier); so much shit is hooked up to the internet nowadays, including industrial control systems.
If you caused a small enough fault that's enough to shut a big system down it could take a week to fix. Or you could simply cause immense amounts of widespread destruction.
[QUOTE=RapistSanta;50350044]Reminds me of this guy
[img]http://i.imgur.com/dtWAGbU.png[/img][/QUOTE]
It's honestly terrifying, partly because of the ease and partly because eventually, [I]someone[/I] is going to catch on and make use of this info.
[QUOTE=Downsider;50349921]I mean, it's basically next level skid shit. Like, a script kiddie who isn't afraid to leave his house, has a car, and can afford to buy a raspberry pi. They're just using premade tools, no real interesting reverse engineering going on here.
And any RFID security card that can be cloned with an RFID cloner is increeeeeeeedbily poorly designed and missing the whole point of what RFID should be used for in security..[/QUOTE]
Most attacks are carried out using premade tools and social engineering. Theirs always going to be that guy on the news that's a genius hacker and wrote their own tools and reversed engineered something on their own but they're rather uncommon if not rare.
Hollywood teaches our society the false image that you need to be some underground next level computer wizzard to do any damage with hacking and its the exact opposite.
[vid]http://webm.red/cbkR.webm[/vid]
???????
Btw in regards to that post I dont think spark gap jammers would interfere much with microwave radio communications, which includes satellite links. I would assume that the jammers are on the ground somewhere, and microwave antennas are very heavily collimated such that I doubt they will pick up that much on a jammer from a reasonable distance. Basically I would bet you would still get satellite TV and the military can still set up radio relay nodes.
Also since spark gap transmitters are broadband and omnidirectional they actually arent that strong and so any real attempt to overcome them will probably be successful. In the US the most power you can usually obtain from a normal outlet is around 2.4kw
[QUOTE=Skipcast;50351054]He's executing commands on the remote computer though, it's not just the local command prompt. :v:
[editline]19th May 2016[/editline]
He even explained it as they were showing it[/QUOTE]
Is it? The dude's name is Steve Kaun. Why would the user on the remote machine be named SteveK?
[QUOTE=Downsider;50354552]Is it? The dude's name is Steve Kaun. Why would the user on the remote machine be named SteveK?[/QUOTE]
Because they're showing off the possibility? It's not like they have infected computers at their fingertips just waiting. They're a security company, not actually hacking people.
How about looking up what the tool on the screen actually is:
[url]https://www.offensive-security.com/metasploit-unleashed/about-meterpreter/[/url]
[QUOTE=TurtleeyFP;50351531]Anyone know of good fiction based on this/OP video? This kind of stuff is fascinating to me.[/QUOTE]
The OP video is Shadowrun as fuck.
Friendly reminder that security through obscurity hasn't been a thing since the 80's
E: this would make good cypherpunk
[QUOTE=RapistSanta;50350044]Reminds me of this guy
[img]http://i.imgur.com/dtWAGbU.png[/img][/QUOTE]
if the song Uprising was made into a movie this would be part of it
[QUOTE=TurtleeyFP;50351531]Anyone know of good fiction based on this/OP video? This kind of stuff is fascinating to me.[/QUOTE]
The closest show on television right now would probably be Mr. Robot.
[QUOTE=Skipcast;50351054]He's executing commands on the remote computer though, it's not just the local command prompt. :v:
[editline]19th May 2016[/editline]
He even explained it as they were showing it[/QUOTE]
Ok.
I just posted that picture
[QUOTE=Killuah;50357744]Ok.
I just posted that picture[/QUOTE]
With the amount of funny ratings i felt i had to defend them because most people wouldn't be able to tell the difference i think.
Sorry, you need to Log In to post a reply to this thread.