Tag Archive: hacking

Jul 27

RookLabs/milano · GitHub

milano – Hacking Team Malware Detection Utility

Source: RookLabs/milano · GitHub

Jul 15

Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems

The dissection of data from the Hacking Team breach has yielded another critical discovery: Hacking Team uses a UEFI BIOS rootkit to keep their Remote Control System (RCS) agent installed in their targets’

Source: Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems

Mar 12

Hacking Facebook Account with ‘Reconnect’ Tool – Hacker News

Hacking Facebook Account with 'Reconnect' Tool – Hacker News.

Dec 24

Imitate Fake Hollywood Terminal Hacking Melodrama with This Amazing App for Ubuntu – Softpedia

Imitate Fake Hollywood Terminal Hacking Melodrama with This Amazing App for Ubuntu – Softpedia.

Nov 29

Resist Surveillance

Detekt is a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS, commercial surveillance spyware that has been identified to be also used to target and monitor human rights defenders and journalists around the world. Read more about our Intentions & Methods.

via Resist Surveillance.

Oct 26

apk-hacking [sebsauvage]

apk-hacking [sebsauvage].

Jul 11

GostCrypt

The Gostcrypt project has been launched at the end of 2013 as fork of the (late) Truecrypt project. Snowden’s leaks have made clear more than ever that the massive use of encryption by citizens must become a reality. This is possible only if there is a vast, rich offer of trusted, open source products like Truecrypt, with the strong support of the hacker community. However, at that time we did not foresee the unprecedented upheaval of terrible shock with the recent Truecrypt disappearance. More than ever we all need more and more projects to replace it. Gostcrypt is one among (we hope) many others. The variety and richness of encryption solutions is THE solution.

But with Gostcrypt, we intend to go farther than ever. Since the late 70s, most of the algorithms used (not to say all) are UKUSA encryption systems that have been chosen, promoted and standardized under the control of the USA and its minions. It is more than likely that among the different levels of control, mathematical trapdoors are part of the game. We thus decided to used strong encryption systems (as far as we know and despite a few recent “manipulation papers” that have nothing to do with science and which are mistaken operational security with fantasy and which have been rejected recently again as non valid [Babenko & Maro, 2014]) which moreover were not invasive as UKUSA ciphers are (mostly AES) by now. The Gost cipher and hash functions are not everywhere, have not invaded our systems and have been designed by the former USSR for its own need. Aside the fact that it is indeed a very strong cipher (when correctly implemented and a suitable key management), this feature of non-aggressive technological expansion is a key point. GOST algorithms have never sought to spread and to impose on anyone. It has even been rejected from the ISO standardization process in 2012 as a consequence of fallacious, non-reproducible allegations of weakness.

Whatever may be the quality and features of a security project, it can be valid in the long run with trust only. Trust is only possible with open source code and above all with the active support of the hacking community, which will analyze the security, report bugs, make comments and contribute to the project. So welcome on board to everybody.

via GostCrypt.

Mar 09

Hacking de Femtocell « Korben

Hacking de Femtocell « Korben.

Jul 03

Ubisoft admits major hacking breach, advises password change • The Register

Ubisoft admits major hacking breach, advises password change • The Register.

Jul 03

Hacking Radio Ambulance | Korben

Radio Ambulance | Korben.

Older posts «