GPRS Interception – how to sniff 2G mobile data

Karsten Nohl / Luca Melette explained how it works at the Chaos Computer Club Communication Camp 2011. Camp 2011: GPRS Intercept. A simpler tutorial can be found here – Download sources into ~/gprs_sniffer git clone git://git.osmocom.org/osmocom-bb.git git clone git://git.osmocom.org/libosmocore.git git clone git://git.srlabs.de/gprsdecode.git wget http://srlabs.de/dl/gprs_multi.patch – Download ARM cross compiler wget http://gnuarm.com/bu-2.15_gcc-3.4.3-c-c++-java_nl-1.12.0_gi-6.1.tar.bz2 tar xf bu-2.15_gcc-3.4.3-c-c++-java_nl-1.12.0_gi-6.1.tar.bz2 – Read more about GPRS Interception – how to sniff 2G mobile data[…]

sqlmap: automatic SQL injection and database takeover tool

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the Read more about sqlmap: automatic SQL injection and database takeover tool[…]

SSL hacked and decrypted using BEAST

“BEAST is different than most published attacks against HTTPS,” Duong wrote in an email. “While other attacks focus on the authenticity property of SSL, BEAST attacks the confidentiality of the protocol. As far as we know, BEAST implements the first attack that actually decrypts HTTPS requests.” via Hackers break SSL encryption used by millions of Read more about SSL hacked and decrypted using BEAST[…]

An Analysis of Anonymity in the Bitcoin System: Bitcoin is not Anonymous

Bitcoin is not inherently anonymous. It may be possible to conduct transactions is such a way so as to obscure your identity, but, in many cases, users and their transactions can be identified. We have performed an analysis of anonymity in the Bitcoin system and published our results in a preprint on arXiv. via An Read more about An Analysis of Anonymity in the Bitcoin System: Bitcoin is not Anonymous[…]

Charlie Miller Finds Way to Hack MacBook Battery | News | The Mac Observer

Security researcher Charlie Miller has announced that he has found a way to hack the chips that control the batteries in Apple’s MacBook, MacBook Pro, and MacBook Air. Using these chips, he was able to brick (or ruin) batteries, or even install persistent malware that would survive a physical hard drive change. via Charlie Miller Read more about Charlie Miller Finds Way to Hack MacBook Battery | News | The Mac Observer[…]

Nintendo DS hacking

This is done with an R4 chip: buy one: http://www.ts-shops.eu/nintendo-dsi-xl/flash-cards There’s a difference between the r4 and r4i You then put a kernel on the chip: http://www.r4i-sdhc.com/downloade.asp Instructions for formatting your r4 card http://www.r4dscards.com/R4i-DS-Card/ Download games to put on: http://www.dgemu.com/

LulzSec cleartext accounts and passwords

On June 16, 2011, LulzSec released over 62,000 accounts containing emails and passwords in cleartext obtained from random sources. LulzSec announced the release in a Twitter post at https://twitter.com/#!/LulzSec/status/81327464156119040. The table below is the list of these accounts. Passwords have been partially masked to protect the users from further attacks. LulzSec cleartext passwords.

European Council: Creating hacking tools should be criminal across EU. Idiots.

“The following new elements [should include] penalisation of the production and making available of tools eg, malicious software designed to create ‘botnets’ or unrightfully obtained computer passwords for committing the offences [of attacks against computer systems],” the Council of Ministers said in a statement pages 18-19 of 38-page/176KB PDF. The real problem with this, is Read more about European Council: Creating hacking tools should be criminal across EU. Idiots.[…]