Ask me anything

9to5linux,
@9to5linux@floss.social avatar

Kali Linux 2024.2 Ethical #Hacking Distro Released with #GNOME 46, New Tools, and t64 Transition https://9to5linux.com/kali-linux-2024-2-ethical-hacking-distro-released-with-gnome-46-new-tools

#OpenSource #Linux

realhackhistory,
@realhackhistory@chaos.social avatar

One of the first articles about #ransomware in the sense we think about it now, drive by exploitation of Internet Explorer leading to infection by 'pgpcoder', $200 ransom payable via bank transfer, contact with the people behind the attacks via yahoo! email. We've come a long way since.
#hacking #hacker #history

kramse,
@kramse@social.kramse.org avatar

So I have a presentation tonight, and thought I would promote BornHack a bit @bornhack

It is a very nice, cozy, HYGGE camp in Denmark July 17-24. You should consider it if you need a break from the outside world.

I looked these pictures I took of my camp, and associated KEA tent from last year. It sums up the camp for me, sleeping tent, working tent, serious tent and when the night falls, music and lights

You should come too!
https://bornhack.dk/bornhack-2024/

Night time, small tent space with LED lights, music is definitely on!
Tent with a work space, table, monitor and a lot of mess around the space

tempo,
@tempo@radikal.social avatar

@siggi @kramse @bornhack has already been there for months ;)

https://dukop.dk/6318/

benjaoming,
@benjaoming@social.data.coop avatar

@tempo @siggi @kramse @bornhack Is there a Bornhack illustration that has a bit more of a "poster" feel than a standalone logo?

Maybe put the logo on top of one of the photos from https://www.instagram.com/bornhax/ ?

stereo4x4,
@stereo4x4@techhub.social avatar

As is shut down in a few days I think I can disclose this now:

Long long time ago, the official ICQ client allowed avatars. It was possible to use custom flash avatars (from a webserver controlled by me) by uploading a special XML file pointing to that URL using the Miranda (?) ICQ plugin.

The flash avatars allowed and the flash player was running as local user. The intended use case was animated avatars (I send a smiley and the avatar smiles).

I crafted a flash file that displayed a static picture (so nobody will notice its a flash avatar), but opened a http connection to my server and waited for commands. I just used this to run "play this mp3 from that URL" and prank people and never used it for something evil. Never tried to figure out what was possible in terms of local access etc. and never disclosed this possibility until now.

realhackhistory,
@realhackhistory@chaos.social avatar

Fascinated by this story that got a lot of attention in July of 2003.

"The government and private technology experts warned Wednesday that hackers plan to attack thousands of Web sites Sunday in a loosely coordinated "contest" that could disrupt Internet traffic."
#hacker #hacking #history

realhackhistory,
@realhackhistory@chaos.social avatar

The defacers-challenge domain looked like this a few months later

TechDesk,
@TechDesk@flipboard.social avatar

A hacker group has claimed responsibility for a cyberattack that targeted auction house Christie’s earlier this month.

The attack took place just before the start of its high-profile spring sales event involving more than $850 million worth of art. Online bidding was suspended, but the group claims it has accessed sensitive information about wealthy art collectors around the world, and is threatening to release it unless “an agreement” is reached. Digital Trends has more.

https://flip.it/at-MY2

#Hacking #Cybersecurity #Christies #Art #Tech

paul_denton, French
@paul_denton@mastodon.social avatar

Si vous êtes comme moi déjà un peu énervé ne lisez pas cette enquête de France Info sur le piratage de nos données à Pôle Emploi pardon France Travail (et patrie). Je suis en train de bouillir... https://www.francetvinfo.fr/replay-radio/le-choix-franceinfo/piratage-de-france-travail-la-direction-avait-ete-alertee-sur-une-faille-de-securite_6536786.html

#FranceTravail #Emploi #Informatique #Securite #Police #Chomage #Hacking

Thierry31,
@Thierry31@piaille.fr avatar

@paul_denton

Promis, je ne vais pas la lire
Suis déjà assez enervé/révolté.

TreseBrothers,
@TreseBrothers@mastodon.social avatar

While we're still working on an in-game tutorial for Matrix hacking, here's a quick YouTube guide we put together: https://youtube.com/watch?v=HXn6OSRzvIQ

Learn to hack to drop the alarm level, control security devices, get valuable paydata, and complete CPU spike missions.

#Hacking #TacticalRPG #VideoGames #PCGaming #LinuxGaming #MacGaming #Cyberpunk #RPG #Gaming #Matrix

Cupropituvanso, German
@Cupropituvanso@chaos.social avatar

Hack Mas Castle Trailer zum österreichischen Hackerevent in Ottenschlag
https://youtu.be/gb7-UcMu_lo @hackmas

realhackhistory,
@realhackhistory@chaos.social avatar

Please RT for reach: I’m trying to #FOIA records on computer intrusions into DOD systems during first Gulf War (1990), I have a GAO report which gives a high level summary but am looking for more.

Does anyone know what DOD department might have investigated #hacking back then?

realhackhistory,
@realhackhistory@chaos.social avatar

My next question is for #Dutch #hackers (#Netherlands), does anyone know if clips from this news show still exist?
#hacking #history

amsterdam,
@amsterdam@typo.social avatar

@realhackhistory This presumably refers to the item Computerkrakers (Computer hackers) in the television program Achter het nieuws (Behind the news) that was broadcast on 2 February 1991. The digitized footage can be requested from the media archive of Beeld & Geluid (Image & Sound): https://zoeken.beeldengeluid.nl/program/urn:vme:default:program:2101608060047283231

Bit_form,
@Bit_form@corteximplant.com avatar
realhackhistory,
@realhackhistory@chaos.social avatar

US government GAO report on Dutch #hackers accessing US defense systems during the first gulf war (Desert Storm).
#hacking #history
https://archive.org/details/vt-imtec-92-5_202405

realhackhistory,
@realhackhistory@chaos.social avatar

@mxy, got it uploaded ⤴️

hyde,
@hyde@lazybear.social avatar

Will I buy the #2600 magazine full back issue plus the lifetime subscription?

#100DaysToOffload [23/100] #hacking #phreaking #privacy #computers

#WeblogPoMo2024 [ 12 / 31 ]

https://lazybear.io/posts/2600-magazine

hyde,
@hyde@lazybear.social avatar

@adamsdesk No, they did, before the end, one issue with a cd (dvd ?) of all the years. There was also all the Perl articles if I remember correctly

adamsdesk,
@adamsdesk@fosstodon.org avatar

@hyde Oh right I completely forgot about that. I wish I could have gotten my hands on one.

hackeriet,
@hackeriet@chaos.social avatar
Naich,
@Naich@fosstodon.org avatar

I've knocked up a quick hack for those in the UK who want to know if it's worth going outside to try and see the aurora.

https://qop.pm/aurora.html

Just bung in your postcode and leave it running to keep updated with the probability of it being visible.

dcz,
@dcz@fosstodon.org avatar

Hey Fediversians, is anyone going to #GPN https://gulas.ch ? I'm looking for roommates today.

#conference #hacking #germany

realhackhistory,
@realhackhistory@chaos.social avatar

Uploaded some court documents from an appeal by Electra, a phone phreak who was caught up in Operation Sun Devil for hacking voicemail systems and sharing calling card codes.

https://archive.org/details/com.-v.-gerulis

liaizon,
@liaizon@wake.st avatar

@realhackhistory fascinating! thank you for uploading these

realhackhistory,
@realhackhistory@chaos.social avatar

@liaizon no problem! I am always on the lookout for stories relating to female hackers and phone phreaks as their stories are seriously under-represented in any of the mainstream hacker history timelines.

realhackhistory,
@realhackhistory@chaos.social avatar

Stumbled across this 1984 episode of the comedy series Night Court called "The Computer Kid" about a precocious boy who winds up in trouble for his school and I love it.

"He's plugged his computer into the phone!"

video/mp4

tness16, French
@tness16@mastodon.social avatar

violence et coup de pression, qui a tenté d’empêcher la diffusion ?

La fait elle la police en ?
Hacking violence et coup de pression, qui a tenté d’empêcher la diffusion ?

Alerté en amont, Envoyé Spécial a pu suivre et filmer une opération clandestine de la à . Une à peine croyable racontée dans un exceptionnel qui dérange la Chine.

https://invidious.fdn.fr/watch?v=-oOuo6fDcIY

realhackhistory,
@realhackhistory@chaos.social avatar

An article by David E. Sanger
via the New York Times News Service which was published in the Pittsburgh Post-Gazette on the 24th of November, 1988.

This reminds me of Russian news headlines about Russian hackers:

"Envious of computer virus
Well-behaved Japanese programmers have not developed the creative of U.S. competitors"

realhackhistory,
@realhackhistory@chaos.social avatar

"A computer virus is the product of a creative mind- a different type of creativity than Japan usually produces," said Yuichi Murano, an
executive of Nihon Sun Microsystems.
"Those are the kinds of talents we need more of." Nihon Sun is the Japanese subsidiary of a Silicon Valley company, Sun Microsystems, whose machines are both the favorite tools and the favorite targets of many hackers.

realhackhistory,
@realhackhistory@chaos.social avatar

Japan hardly lacks software talent. By some estimates, there are more than a half-million programmers, but they seem remarkably well behaved.

Last year, the national police recorded only 15 instances of computer crime, most of them trivial. But this year may be a different story.

realhackhistory,
@realhackhistory@chaos.social avatar

Been reading about the case of Edward Austin Singh in the UK, a #hacker who was caught physically trespassing in a Teesside Polytechnic college computer lab, while connected to various #hacked computers, by UK police in 1988.
#hacking #history

realhackhistory,
@realhackhistory@chaos.social avatar

Apparently the US Secret Service had become aware of Singh's hacking activities that touched on US government, military and corporate systems and there was some attempt to lure him to the US for arrest before the UK authorities eventually stepped in.

ukscone,
@ukscone@fosstodon.org avatar

@realhackhistory I used to hang out with Edward quite a lot for a couple of years. Nearly went into business with him after we developed some secure file transfer software. After the Surrey stuff he did a nice "prank" hack on a video store chain.

Last I heard about him were rumours he was working for microsoft. never verified

There is a great book about him called "Beating the System" by Owen Bowcott

https://www.amazon.com/Beating-System-Hackers-Phreakers-Electronic/dp/0747505136

realhackhistory,
@realhackhistory@chaos.social avatar

Can anyone help me find references, videos or news reports relating to this, as seen in The Sydney Morning Herald, 7th November 1988?

It concerns a incident and Belgian Prime Minister Wilfried Martens in, I think, October of 1988.

miah,
@miah@hachyderm.io avatar
realhackhistory,
@realhackhistory@chaos.social avatar

I had never heard of any of this.

From The Spokesman-Review, 13th May, 1989.

"In October, a computer hacker revealed how he entered the Belgian government's computer system and for several months read the electronic mail of about 10 Cabinet ministers, including Prime Minister Wilfried Martens.
The hacker said he even met other "burglars" in the system, which had confidential information such as details on terrorist killings and the agenda of weekly Cabinet meetings."

realhackhistory,
@realhackhistory@chaos.social avatar

The story of the first person convicted of planting a destructive computer virus, Donald Gene Burleson, from the March 1989 issue of Texas Monthly. This is a great write up of the story behind an incident that had taken place in 1985 and the resulting court case.

https://www.texasmonthly.com/true-crime/search-and-destroy/

realhackhistory,
@realhackhistory@chaos.social avatar

Fantastic illustration too.

realhackhistory,
@realhackhistory@chaos.social avatar

Still combing through #hacker stories in news archives from 1987 & what the hell is this.

As reported in The Albany Herald in April of 1987, this cop had his #hacking conviction reversed, he'd managed to cyberstalk women in 1984! Unbelievable this was already a thing back then.

realhackhistory,
@realhackhistory@chaos.social avatar

Olson, according to the investigating officers, admitted his uses of the computer "were not part of any official inquiry. but were solely for his own use for some sort of collection he called his 'Rogues' Gallery'"

realhackhistory,
@realhackhistory@chaos.social avatar

Love that this story isn't framed as "creeper corrupt cop wins appeal" but "hacker wins appeal".

bobby,

There is a new PHP vulnerability out. It is being tracked as CVE-2024-2961. Here’s a video explaining the vulnerability https://youtu.be/u8jLUjpCWrs?si=Fm1JSBdAW9VBzuhj #cve #vulnerability #hacking #php #linux #news #Security

heiglandreas,
@heiglandreas@phpc.social avatar

@bobby

😱 ALL PHP-Applications are vulnerable!!!!111!!!!! 😱

Even the ones that don't use iconv!!!11!!1!!!1!! 😱

A great time to differentiate who is talking and who has something to say...

  • All
  • Subscribed
  • Moderated
  • Favorites
  • hacking
  • DreamBathrooms
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • mdbf
  • tacticalgear
  • JUstTest
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • megavids
  • lostlight
  • All magazines