Skip to main content

Posts

Showing posts with the label hacked

7 Ways to Bypass Android's Secured Lock Screen

HOW TO: If you somehow forgot the pattern, PIN, or password that locks your Android device, you might think you're out of luck and are destined to be locked out forever. These security methods are hard to crack by design, but in many cases, it's not entirely impossible to break into a locked device. There are several different ways to hack a locked Android smartphone or tablet, but unfortunately, there's not a one-size-fits-all method. So below, I'll go over 7 of the most effective methods, and hopefully one will help you get back into your device. Method 1Use Android Device Manager For newer Android phones and tablets, a service called  Android Device Manager  is probably your best bet. As long as you're logged into your Google account, you can use any device or computer to access the service, which is available at  this link . As counterintuitive as it may sound, start by clicking the "Lock" button once Android Device Manager gets a fix on your devi

HOW TO HACK WI-FI Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher

 hackers! Do you need to get a Wi-Fi password but don't have the time to  crack it ? In previous tutorials, I have shown how to crack  WEP ,  WPA2 , and  WPS , but some people have complained that cracking WPA2 takes too long and that not all access points have WPS enabled (even though quite a few do). To help out in these situations, I present to you an almost surefire way to get a Wi-Fi password without cracking— Wifiphisher . Steps in the Wifiphisher Strategy The idea here is to create an  evil twin AP , then de-authenticate or DoS the user from their real AP. When they re-authenticate to your fake AP with the same SSID, they will see a legitimate-looking webpage that requests their password because of a "firmware upgrade." When they provide their password, you capture it and then allow them to use the evil twin as their AP, so they don't suspect a thing. Brilliant! To sum up, Wifiphisher takes the following steps: De-authenticate the user from their legitimat

INJECTING CODE INTO MOUSE FIRMWARE SHOULD BE YOUR NEXT HACK

Here’s a DEF CON talk that uses tools you likely have and it should be your next hacking adventure. In their  Saturday morning talk  [Mark Williams] and [Rob Stanely] walked through the process of adding their own custom code to a gaming mouse. The process is a crash course in altering a stock firmware binary while still retaining the original functionality. The jumping off point for their work is the esports industry. The scope of esporting events has blown up in recent years.  The International 2016 tournament  drew 17,000 attendees with 5 million watching online. The prize pool of $20 million ($19 million of that crowdfunded through in-game purchases) is a big incentive to gain a competitive edge to win. Contestants are allowed to bring their own peripherals which begs the questions: can you alter a stock gaming mouse to do interesting things? The  steelseries Sensei  mouse was selected for the hack because it has an overpowered mircocontroller: the STM32F103CB. With 128 KB of fl

Hackers Extorted $28 Million in Cryptocurrencies Last Year

Victims lost $1.33 billion to cyber criminals in 298,728 cases, with hackers stealing and extorting $28.3 million in cryptocurrencies in 2016. On June 22, the Federal Bureau of Investigation presented its annual  Internet Crime Report  for the year of 2016. The FBI analyzed the victim reports at the  Internet Crime Complaint Center  (IC3) and used the information from their database to publish the annual study. It is important to mention that, according to the Department of Justice’s research, only an  estimated 15 percent  of the U.S. fraud victims reported their crimes to law enforcement. The FBI highlighted multiple “hot topics” regarding internet crimes for the year of 2016. This included Business Email Compromise (BEC), which resulted in the loss of $360 million from victims, currently standing in first place in the category of most damage caused. BEC is a sophisticated scam targeting companies working with international or foreign businesses or suppliers who conduct wire

Receive Hackspace WiFi Code

When you are running a hackspace, network security presents a particular problem. All your users will expect a wireless network, but given the people your space will attract, some of them are inevitably going to be curious enough to push at its edges. Simply plugging in a home WiFi router isn’t going to cut it. At Santa Barbara Hackerspace they use Unifi access points on their wireless network, and their guest network has a system of single-use codes to grant a user 24-hour access. The system has the ability to print a full sheet of codes that can be cut individually, but it’s inconvenient and messy. So the enterprising hackspace members have used a Raspberry Pi and a receipt printer to  deliver a single code on-demand at the press of a button . The hardware is simple enough, just a pull-up and a button to a GPIO on the Pi. Meanwhile the software side of the equation has a component on both client and server. At the server end is a Python script that accesses the Unifi MongoDB datab

Russia hacked the US election. Now it’s coming for western democracy

Vladimir Putin wants to extend his influence beyond the ballot box and into the very fabric of our public life. We must take action before it’s too late  Illustration by Sébastien Thibault The Russian  hacking of the Democratic National Committee  (DNC) and members of Hillary Clinton’s campaign is being treated too much like a novelty and not enough as a serious and persistent security threat. The problem becomes more urgent as we see it spread to other countries. WikiLeaks, which disseminated stolen DNC documents, announced last week that it would turn its attention to France, and has released material relating to presidential candidates  François Fillon  and Emmanuel Macron, opponents of Marine Le Pen. US intelligence agencies found  clear linkge between Wikileaks and the Russian state; we have to assume Russia will use these to undermine Vladimir Putin’s arch-nemesis, Angela Merkel, when she faces the far-right Alternative für Deutschland at the polls in September. But there’s