Harshit Agrawal

@Harshitnic

Because RF waves are free (or difficult to control). Love RF, antennas and satellites | | |

Vrijeme pridruživanja: siječanj 2012.

Tweetovi

Blokirali ste korisnika/cu @Harshitnic

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Harshitnic

  1. proslijedio/la je Tweet
    15. sij

    Registration for the 2020 Metasploit community CTF is now open. 1,000 teams, four days to find flags, unlimited shells. Play starts January 30. NOTE: Teams only need to register ONE account. Get it:

    Poništi
  2. proslijedio/la je Tweet
    14. sij

    Awesome Forensics Resources : Almost 300 open source forensics tools and 600 blog posts about forensics &1000+ Github Repos about Security Resource Collection :

    Poništi
  3. proslijedio/la je Tweet
    13. sij

    A customized SharpLocker / fake login screen fools even the best sysadmin - did you lock your screen when you went for coffee ? ( )

    Poništi
  4. proslijedio/la je Tweet
    10. sij

    New: SIM swappers are escalating. Hackers now reaching directly into AT&T, T-Mobile, Sprint systems to perform SIM swaps themselves. Seen screenshots of this in action with T-Mobile and AT&T; Sprint confirmed issue. SIM swapper source confirmed reporting

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    I was intrigued about how Alexa listened, the potential for false positives and what was recorded. This was done over Xmas and the results leave me with more questions.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    9. sij

    **Bluetooth Low Energy () 101** In this blog post, bandit writes about Bluetooth smart, Generic Access Profile (GAP), Generic Attribute (), scanning for devices & reading & writing data.

    Poništi
  7. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  8. proslijedio/la je Tweet
    14. pro 2019.

    The latest release of , the security testing and exploitation framework, is now also available on the Python Package Index (PyPI). $ pip3 install expliot --user Hint: Consider to use a Python venv for the installation

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    9. pro 2019.

    [THREAD]⬇️⬇️⬇️ messages exchanged by devices leak a wide range of data that can expose users to various threats: tracking, inference of activity, exposure of e-mail and phone number, fingerprint of Siri voice commands ...

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    4. pro 2019.

    Dump AES keys from wireless Logitech receivers using Chrome Browser. Demo page: Source:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    30. stu 2019.

    RT [private] Notes on reverse engineering the BTLE protocol of a fire weather radio.

    Poništi
  12. proslijedio/la je Tweet
    27. stu 2019.

    The Most Expensive Lesson Of My Life: Details of SIM port hack by

    Poništi
  13. proslijedio/la je Tweet
    28. stu 2019.

    There's an interesting story doing the rounds about the Raspberry Pi 4 WiFi not working at higher HDMI resolutions. I had a quick look with a HackRF & near-field probe and there's definitely a big spike that stamps right on channel 1

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    18. stu 2019.

    I just published a new attack that breaks Mimblewimble's privacy model. This attack traces 96% of all sender and recipient addresses in real time. Here's a summary and what it means for the future of privacy coins:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    26. lis 2019.

    Totally impressed by WebHID api. Right: USB serial console on nRF52 dongle, which tries to output notifications of a proxied bluetooth mouse. Left: Same info encoded into raw USB HID reports and grabbed by browser using WebHID.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    29. lis 2019.

    BLExy development: Bluetooth LE proxying like a boss ... intercepted mouse traffic is forwarded to browser via USB HID, modified in JavaScript, sent back to BLExy via USB and forwarded the phone via BLE. Mouse is still working without noticeable delays

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    29. lis 2019.

    MarmotE, the 2nd place winners of 's SC2 grand challenge, has pushed public their GNU Radio-based radio design! This is an amazing contribution to the community 😃

    Poništi
  18. proslijedio/la je Tweet
    28. lis 2019.

    The dark army is using a RTL-SDR and gqrx to intercept a conversation between Elliot Alderson and Mr. Robot. (Season 4 Episode 4)

    Prikaži ovu nit
    Poništi
  19. 14. lis 2019.

    Thank you for giving us the opportunity presenting in your CommSec track. I just finished my talk on RF Exploitation & Defenses along with

    Poništi
  20. proslijedio/la je Tweet
    13. lis 2019.

    Join and in Commsec Talk at at 10:00am today. Interesting talk on IoT and RF for people who are starting with RF attacks.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·