Sercomm hack.. - Printable Version +- Haxorware Forums (http://www.haxorware.com/forums) +-- Forum: General (http://www.haxorware.com/forums/forumdisplay.php?fid=6) +--- Forum: Modems (http://www.haxorware.com/forums/forumdisplay.php?fid=7) +--- Thread: Sercomm hack.. (/showthread.php?tid=3579) |
Sercomm hack.. - Canis-Major - 28-05-2015 It's defo not new, but worth looking at.. https://github.com/elvanderb/TCP-32764 An explanation of why I post this: In many device's, there are indeed backdoors. nSA style backdoors. Dell bios's actually have an open port exactly the same as this built into the bios. This Sercomm is in more device's than you know, and if your using a router, it's there, wether the exploit works, that's down to the firmware allowing, or even showing it.. It's the haxorware httpd task in your haxed modem RE: Sercomm hack.. - neo_ - 28-05-2015 Thanks for the link RE: Sercomm hack.. - altos - 29-05-2015 Thanks for sharing.I love backdoors,and the NSA RE: Sercomm hack.. - cayman - 29-05-2015 Backdoor sockets are present almost everywhere, especially on win version above win XP, where dumb Microsoft was still not up to date how to implement to the full extent. There was reports, that Hard Drivers manufactures were using back door on boot sectors for at least for 15 years. How Nsa can implement search engines in this vast avalanche of info flowing to them , is another story. They are not geniuses , rather dumb idiots looking for the easy way out. And regular hackers , not smartest ones were able to break into their servers without bigger problem.....and their equipment and methods are not that sophisticated either, at least not what we use to think.... he he he, akamai servers.... They are on the intelligence level of ABM jr Master Rat = zircom and his aliases.... ~~~~~~~~~~ Quote:just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it. So anyway. Hit these -- you hit PRISM. And die in the Matrix, you die in real life, etc etc.See, how smart boys at NSA are ????? ~~~~~~~~~ Google was bankrolled by CIA from the begining, and facebook and twitter were created by idiots for the idiots, doesn't matter who bankrolled them, sickening,..... Eh, cheap satelites are right now in hands of new era hackers, and sooner or later anonymous surfing is gonna be available again.... RE: Sercomm hack.. - cayman - 29-05-2015 NSA Wants To Track Smartphone Users Based on How They Type and Swipe Just the way you swipe your smartphone screen is enough for your smartphone to identify you. Yes, it’s a Fact, not Fiction! The United States National Security Agency (NSA) has a new technology that can identify you from the way your finger swipe strokes and text on a smartphone screen, according to officials with Lockheed Martin who helped design the technology. John Mears, a senior fellow for Lockheed IT and Security Solutions, told NextGov that Lockheed Martin has been working with the agency to create a "secure gesture authentication as a technique for using smartphones," and "they are actually able to use it." Mandrake – New Smartphone-Swipe Recognition Technology This new smartphone-swipe recognition technology, dubbed "Mandrake," remotely analyses the curve, unique speed and acceleration of a person's finger strokes across their device's touchscreen. "Nobody else has the same strokes," Mears explains. "People can forge your handwriting in two dimensions, but they couldn’t forge it in three or four dimensions." "Three is the pressure you put in, also to the two dimensions on the paper. The fourth dimension is time. The most advanced handwriting-type authentication tracks you in four dimensions." Mandrake is similar to Dynamic Signature – a motion recognition technology originally developed by the US Air Force in 1978 for Pentagon to capture the behavioural biometrics of a handwritten signature. NSA wants to give more accuracy to users. Oh! Really? The NSA has tested the smartphone-swipe recognition technology in an attempt to move past the age of passwords because the technology is expected to be more accurate than the use of passwords. The United States spy agency is keeping mum on how the NSA might use the new technology though Mears says that the organization can actively deploy the technology right now, and could already be exploiting it as part of its creepy bulk data collection program. So, it has yet to be known how NSA make use of this new technology to add up to its Global surveillance program to spy on innocent people. The latest revelation comes this week that the agency planned to hijack Google and Samsung app stores to infect smartphones with Spyware to secretly collect data from the devices without their users knowledge or confirmation. Deploying Mandrake for Emergency Responders: There aren’t many details about the technology available yet, but it is believed that the technology potentially could be used for emergency responders or mission-critical personnel, who often don't have the time or capability to get online for reporting purposes. "If you are going 100 miles down the road, you are not going to enter a complex 12-character password to authenticate yourself," Mears says. "We have some customers who deal with radioactive material and they cannot touch things that small with gloves on – how do they authenticate?" NSA is not Alone However, the NSA is not the only United States agency who is looking for improvements on the password for smartphone device security. Recently, the Federal Bureau of Investigation (FBI) has spent $1 Billion on a program – called the Next Generation Identification (NGI) system – which has the capability to recognize faces, fingerprints, palm prints, tattoo images, and retinal scans. NGI system is also developed by Lockheed and in future may incorporate voice and "gait" recognition to identify how a person walks. Read further: Quote:Fingerprint Cards shares at record after Google tie-up=========== very soon NSA and GOOGLE imbecils by tracing vibration of keys on my keyboard will be able to find out what I had for dinner , when I fart Read further: Quote:Fingerprint Cards shares at record after Google tie-up=========== very soon NSA and GOOGLE imbecils by tracing vibration of keys on my keyboard will be able to find out what I had for dinner , when I fart RE: Sercomm hack.. - Canis-Major - 29-05-2015 Yup, totally useless compared to the goodies.. |