Facebook killed the radio star. And by radio star, I mean the premise of distributed forums around the internet. And that got got by Instagram/SnapChat. And that got got by TikTok. Where the fuck is the internet we once knew?
0 Members and 2 Guests are viewing this topic.
Can't wait to read their paper.Via InfoWorld.[snip]Security researchers have found a way to seize control of a laptopcomputer by manipulating buggy code in the system's wireless device driver.The hack will be demonstrated at the upcoming Black Hat USA 2006conference during a presentation by David Maynor, a research engineerwith Internet Security Systems and Jon Ellch, a student at the U.S.Naval postgraduate school in Monterey, California.The two researchers used an open-source 802.11 hacking tool calledLORCON (Lots of Radion Connectivity) to throw an extremely large numberof wireless packets at different wireless cards. Hackers use thistechnique, called fuzzing, to see if they can cause programs to fail,or perhaps even run unauthorized software when they are bombarded withunexpected data.Using tools like LORCON, Maynor and Ellch were able to discover manyexamples of wireless device driver flaws, including one that allowedthem to take over a laptop by exploiting a bug in an 802.11 wirelessdriver. They also examined other networking technologies includingBluetooth, Ev-Do (EVolution-Data Only), and HSDPA (High Speed DownlinkPacket Access).[snip]More:http://www.infoworld.com/article/06/06/21/79536_HNwifibreach_1.html- ferg--"Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawg@netzero.net or fergdawg@sbcglobal.net ferg's tech blog: http://fergdawg.blogspot.com/_______________________________________________Fun and Misc security discussion for OT posts.https://linuxbox.org/cgi-bin/mailman/listinfo/funsecNote: funsec is a public and open mailing list.
[20:21:13] xar: i was just thinking about the time iago came over here and we made this huge bomb and light up the sky for 6 min[20:21:15] xar: that was funny
That's pretty awesome. I'd want to see it at the Black Hat convention and learn howt o do it and scare the hell out of my brother.
Well, according to the article details on the exploitation method will be presented at Black Hat, which is why it's relevant in this thread. The point of cons is to showcase new technologies and new techniques, which very frequently involves hacking demonstrations. That's the reason why a lot of people look up to them, too.
Also, unless you are very familiar with all of the code involved in the hack, there is a possibility that it will do something you didn't expect. There could be malicious code from the writer there that you would execute on your brother's computer without you knowing. This is just one reason why your idea is not as great as it seems to you.
Also, what makes you think showing it in action in front of an audience and possibily an explaination of how it works would allow you to do it? There's a difference between writing code for your specific target and double-clicking an executable file.
Hacking is something very serious, and I wouldn't take it lightly. If something goes wrong (which is always possible), you can do a lot of damage. Additionally, you're violating his trust, in a way. You like reading, so you should check out the book "Rights and Responsibilities of Partipants in Networked Communities" by the Compuer Science and Telecommunications Board National Research Council (no specific author). I've never actually read it, or even flipped through it, but it's on my bookshelf and sounds like it applies
Quote from: iago on June 22, 2006, 11:20:14 pmHacking is something very serious, and I wouldn't take it lightly. If something goes wrong (which is always possible), you can do a lot of damage. Additionally, you're violating his trust, in a way. You like reading, so you should check out the book "Rights and Responsibilities of Partipants in Networked Communities" by the Compuer Science and Telecommunications Board National Research Council (no specific author). I've never actually read it, or even flipped through it, but it's on my bookshelf and sounds like it applies Haha. I think you should read it first to see if it applies.