Contradictory Attacks Are Contradictory

signal-2017-12-05-225754-1209701956.jpg

Did yet another video explaining how pentesters, hackers and other assortments of jackasses who use common pentesting programs like aircrack-ng or metasploit expose themselves to greater levels of EMF radiation by using my EMF detector to point out that when they attack some with a DDOS or DOS attack that there also attacking themselves.

Guess this means that pentesters and hackers become professional victims too

It’s Not Just The Cops Watching

not intended for the criminally minded

Firstly I live in a world where paranoia is healthy and not the latter. Sure the cops are everywhere but not all the time and for those who are convinced of a conspiracy sure there are conspiracies but for crying out loud not every cop is out to get you. There are hackers out there can play the role of police officer but don’t have the authority of one.

Please do not attempt to hack IP cameras or CCTV it is illegal these videos I have clearly presented on my blog are just examples of gusty people. Trying to show you another world that doesn’t live on your conspiracy forums, blogs, twitter feeds or facebook.

not intended for the criminally minded

 

Smartmeter Hacking: The Dangers

Hackers Could Turn Your Smart Meter Into A Bomb and Blow Your Family To Smithereens – New Claim

Smart meters are “dangerously insecure,” according to researcher Netanel Rubin – who claimed the gear uses weak encryption, relies on easily pwned protocols, and can be programmed to explode.

The software vulnerability hunter derided global efforts to roll out the meters as reckless, saying the “dangerous” devices are a risk to all connected smart home devices. Smart meters can communicate with networked devices inside homes, such as air conditioners, fridges, and the like. A hacker who could infiltrate the internet-connected meters could control those gadgets and appliances and potentially unlock doors. They could also manipulate the meter’s code to cause fires, something that’s trivially easy using mains supplies, Rubin claimed. You’d be forgiven for thinking fuses would prevent such a blaze, although the researcher is convinced the hardware can be tricked into overexerting itself and exploding. “An attacker who controls the meter also controls its software, allowing them to literally blow the meter up,” he told the Chaos Communications Congress in Hamburg, Germany, earlier this month.

“If an attacker could hack your meter, he could have access to all the devices connected to the meter. The smart meter network in its current state is completely exposed to attackers.” Rubin was accused of fear-mongering by the conference’s audience. He shot back that he wanted to grab the public’s attention with dire warnings of exploding boxes – claims that reminded El Reg of an old infamousWorld Weekly News spoof.

More Here…….

Related

Foriegn and Domestic Adversaries Are Taking Advantage Of Your IoT Devices

Why it might be a good idea to use strong passphrases to secure internet routing devices. Because if you set it to the default password then what will happen is foreign and domestic adversaries will take advantage of your good will and fuck your shit up literally with a few keystrokes.

In late April, the top federal cybersecurity agency, US-CERT, announced that Russian hackers had attacked internet-connected devices throughout the U.S., including network routers in private homes. Most people set them up – or had their internet service provider set them up – and haven’t thought much about them since. But it’s the gateway to the internet for every device on your home network, including Wi-Fi connected ones. That makes it a potential target for anyone who wants to attack you, or, more likely, use your internet connection to attack someone else.

As graduate students and faculty doing research in cybersecurity, we know that hackers can take control of many routers, because manufacturers haven’t set them up securely. Router administrative passwords often are preset at the factory to default values that are widely known, like “admin” or “password.” By scanning the internet for older routers and guessing their passwords with specialized software, hackers can take control of routers and other devices. Then they can install malicious programs or modify the existing software running the device.

More Here……………

How To Know Whether Your Being Hacked By An Adversary

This is one method for knowing whether your being hacked by an adversary is when you hear radio static human feedback from your wireless routing device. Because as I have come to realize it myself is that anything that operates at 2.4 GHz (UHF) and 5 GHz (SHF) from a wireless routing device can be intercepted using a software defined radio.

What Is Tailgating and Piggybacking

Jungian Psychology

Related