You are here

TheBlackPacket - Tech Info - Volume 2 - Hacking The System (ClownSEC)

Primary tabs

4.29 GiB000
Thanks given1
The Black Packet - Tech Info - Volume 2 - Hacking The System This torrent was created to introduce those in the truth community to various forms of hacking. Topics include, RFID, WIFI, picking locks, keeping yourself self secure, FOIA, Data Mining, Physical Weapons, hacking and protecting mobile devices, using game consoles as a hack station, satellite imagery, hacking the smart grid and parking meters, Sniffing keys through the power grid, picking electronic locks and more... See below for complete listing. Enjoy, and feel free to ask questions if you have them! **brainphreak** --------------------------------------------------------- DVD CONTENTS (most taken directly from Defcon's website) 00 - How It's Made - Microprocessors, Circuit Boards, Compact Discs, Computers, and more. - This is a collection of episodes from the show "How It's Made". These episode clips are all relating to computer technology and is very useful to understand how all this stuff is made. Ever wonder how those CD's are made? Your fiber optics? handheld devices? this goes through the complete manufacturing process. Geek out on the machines! 00 - Sonic Outlaws - Within days after the release of NegativlandÆs clever parody of U2 and Casey Kasem, recording industry giant Island Records descended upon the band with a battery of lawyers intent on erasing the piece from the history of rock music. Craig "Tribulation 99" Baldwin follows this and other intellectual property controversies across the contemporary arts scene. This is an excellent documentary covering the topic of Fair Use. 00 - In The Realm of the Hackers - Australian documentary directed by Kevin Anderson about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers who hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA. 01 - Thinking Machines - Creation of the Computer - Covers the history of the computer, and how the basics of computing works. This is a great introduction into the details of a computers past and present. Briefly covers how RAM and CPU's work, various machines built before the personal computer, government funding, punch cards, and how these physical machines became the PC's we use now. 02 - Triumph of the Nerds - Rise of Accidental Empires pt1 - The history of how computers and programming began. The first languages used to help users to easier program computers, how the silicon microchips are created, who invented them, and how they were introduced to the public. See how the first computer clubs were formed, manual programming concepts, how the first software was created, these were the first computer hackers. Includes interviews with Bill Gates, Steve Jobs and other key players. 03 - Warriors of the Net - How Internet Traffic Works - A great visual representation of how the internet works. Includes information regarding TCP,UDP, and ICMP packets. See how the data travels from when you click a link on the website, leaves your computer, enters the private lan, gets routed to other servers, switches, firewalls, and how this is all done to bring you the internet. 04 - Tactical Exploitation - A new method of gaining entry into computer systems. Tactics used to size up the system, the users, the processes, applications, and existing trust relationships. Target the people, expand the scope of your tests, and you WILL get in. Some examples of great utilities and tools used to break into networks or collect data about the systems and people. 05 - Dangerous Minds - The Art of Guerrilla Data Mining - This presentation explains how huge amounts of information collected in the wild such as GPS, emails, chat logs, search results, bank statements etc. can be looked at by a computer to gain intelligence. How does the government find increase chatter over a specific topic? How do they eliminate false positives like popular news stories, or current events which cause natural increases in chatter. Find out how they find criminal networks. 06 - Boomstick Fu - The Fundamentals of Physical Security - This covers defensive weapon ownership. How to stay within the law and keeping your hardware legal. Rules for keeping your guns safe, how to hold your gun, why you should own a gun, and preparing for the worst case. What kind of gun should you buy? Autoloading vs Pump? Shotgun vs Handgun? Ammo? Stun Guns? Tasers? Pepper Spray? 07 - Biometric and Token Based Access Control - Examples of various biometric systems and attacks. A demo showing how to attack the system. Complete diagrams of how these systems work and the various components. Cover mag stripe cards, proximity cards, concealed barcodes, smart cards, and other systems. Also covers eye scans, hand scans, fingerprint scans, and how they are defeated. 08 - Penetration Testing WIFI Networks - Aaron Peterson speak about WIFI networks and its inherent flaws. A full rundown on penetration testing and searching for security flaws, how wifi scanning works, the difficulties and common tools for breaking security. 09 - How To Be A WIFI Ninja - This presentation covers everything you need to know to become a WIFI ninja. How to go through obstacles, examples of devices using this technology, the frequencies used and technical details of the technology. This talk is mostly about setting up WIFI networks with great distance, and understanding the underlying technology. 10 - Shifting the Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key - This lecture covers some more complex attacks on WIFI networks. While many people are still using WEP, this insecure protocol is slowly being replaced. This video explains some of the technologies and how they too can be attacked and the traffic 'sniffed'. Software tools are discussed and examples given to better understand. 11 - WiFish Finder - Who Will Bite The Bait - This is a very short presentation explaining the security problems in over 50% of all computers wifi. Live demonstrations are given showing hwo much info is obtained by members of the audience. Full encryption types, ESSID's, locations, and other information is immediately found as your computer sends this data to anyone looking. 12 - Attacks Against 2Wire Residential Gateway Routers - These are the most common routers on the market today for DSL users. This talk explains some of the ways that these systems can be hacked. Goes over the default passwords, default admin pages and settings, and other useful info. 13 - Hacking IRAQ - This presentation covers the security and infrastructure in IRAQ. Cellphone's, Internet, Land Lines, and other communications are covered. Also covers the IED devices, triggering systems, and how they are created or categorized. 14 - Picking Electronic Locks - A brief explanation of how electronic lock systems work and how they can be defeated. Covers various components and attack points in the system. How TCP sequence prediction and other 'old hacks' can be used in these new systems. 15 - Hacking with the iPod Touch/Iphone/Ipad - Complete guide to using a mobile 'i' device as a hacking platform. Learn how to hack your iphone first, then which software to install, and finally examples if scanning targets and running exploits on a victim machine. 16 - Is Your Phone PWNED? Auditing, Attacking, and Defending Mobile Devices. - This talk explains various methods of hacking mobile phones. Some real world examples and demonstrations are done to show it in action. Covers technologies like wifi and bluetooth which are standard in most new phones. 17 - Sniffing Keystrokes with Lasers and Voltmeters - What is tempest? Explanation of emissions and electro magnetic pulses utilized in keyboard, and display devices and how to read or use this information without detection. See what someone is typing in the room next to you by simply plugging into the electrical outlet and measuring the leakage into the power grid. 18 - Hacking the Smart Grid Power System - Full white paper and video explaining how the new SMART power grid system works and its weaknesses. This includes everything from privacy concerns, to leeching free power. This new system is flawed by design and now being implemented. 19 - Hacking the Smart Parking Meter - This talk explains the various hardware of 'smart' parking meters, ports for access, and the software. Various meters are covered mostly in use in the Bay Area of California. Understand how the security of these devices work, how money is collected, smart cards, and how to get your own meter to play with. This is a great example of how a hack is done from the ground up. Great blueprint/methodology for your own hardware hacking projects. 20 - The Science of Social Engineering - Hypnosis, NLP, and the science of persuasion. This talk has many examples of how the brain works and which choices they make when put into the situation. The power of influence from others, the power of trust etc. Great talk for aspiring social engineers, how the buffer overflow and other hacker tactics work on the brain. 21 - Satellite Imagery Analysis - What are the good and bad uses of satellite images? What things have been caught with imaging from google maps? How were the first aerial shots taken? Did you know UV and Heat can be viewed through satellite imaging? Also covers various ways to sample the images, design considerations for sensors, collecting data and putting it to use. 22 - Thinking Outside of the Console - How to use game console to gain access to a network. How these consoles can be hidden and attract little suspicion. The art of covert pentesting, performing security analysis on a network undetected using modified video game systems. Covers the various game consoles such as xbox, playstation, nintendo wii, and the internal hardware. 23 - RFID Mythbusting - The purpose of this lecture is to demonstrate the insecurity of RFID devices and cards. Chris shows his custom reading device built out of off the shelf components, explains how to build and obtain reader devices, the incredible distance at which these tags can be read, and other security problems with the encryption and protocols. 24 - High Insecurity - Locks, Lies, and Liability - Special talk relating to high security locks and how they work. Demonstrations of engineering problems and methods to bypass the locking mechanisms. Various security methods are analyzed such as drill proof locks, sawing, and pulling. Lots of info on this one as its nearly 2 hours long, some great footage breaking high security locks live. ----------- Painfully hand picked by **brainphreak** of for the good of the community! Enjoy!
Info File: