Page 1 of 2

Hacking Tutorials

PostPosted: Sat Oct 10, 2015 9:50 am
by desertrat
How to spoof mac address using kali linux macchanger
You can never know too much about how computers work! :thumb2:

Re: Hacking Tutorials

PostPosted: Tue Feb 23, 2016 6:30 pm
by mrgreen
Watch our computer get 'Mousejacked'
It might be fun to experiment around with this kind of thing...

Re: Hacking Tutorials

PostPosted: Mon Mar 28, 2016 6:47 am
by dilbert
How Hackers Are Using Wireless Mice To Steal Your Information
I never did trust mice and now I know why! :shrug:

Re: Hacking Tutorials

PostPosted: Wed May 04, 2016 7:43 pm
by dilbert
Instagram Hacked By 10-Year-Old Whiz Kid
Yes, it pays to be a hacker! This kid was awarded $10K for sharing his exploit with Facebook.

Re: Hacking Tutorials

PostPosted: Thu Jul 07, 2016 6:40 am
by desertrat
The Jig Is Up: You Can Be Prosecuted For Sharing Passwords
To be clear, even though the term "hacking" is used several times in this news clip, using a password that was shared with you most definitely does not make you a hacker. Let us not allow computer illiterate judges and news reporters define terms for us!

Re: Hacking Tutorials

PostPosted: Mon Aug 15, 2016 7:01 am
by dilbert
How Hackers Could Wirelessly Bug Your Office
This is pretty interesting and just goes to show what brilliant minds can do. It also shows that we should never take data security for granted, although the chances of this type of an exploit being used on an ordinary citizen are pretty unlikely since there are bigger fish to fry!

Re: Hacking Tutorials

PostPosted: Mon Nov 07, 2016 6:54 pm
by mrgreen
kali linux usb hacking tricks
Fun with USB devices! :pac:

Re: Hacking Tutorials

PostPosted: Sat Jan 07, 2017 10:04 am
by ergot
Hacking demo(messing with loud neighbors)
Some people just plain deserve to be fucked with! :thumb2:

Re: Hacking Tutorials

PostPosted: Thu Jul 06, 2017 9:39 am
by MojaveMike
Hackers Can Now Use Sound Waves to Take Control of Your Smartphone :pac:
Anyone who can figure out how to employ this exploit could have all sorts of fun!
Along these lines, it’s important to highlight that these experiments were proof-of-concept exercises that exposed serious vulnerabilities in popular consumer hardware. Pwning a smartphone to drive a toy car isn’t particularly dangerous, but the same kinds of accelerometer technology is used in real cars, drones, airplanes, medical devices, and other connected devices.

LINK: http://gizmodo.com/hackers-can-now-use-sound-waves-to-take-control-of-your-1793259066

Re: Hacking Tutorials

PostPosted: Sun Aug 06, 2017 7:27 am
by desertrat
Hacked Caltrans sign targets President Trump
Many of the tutorials explaining how to hack roadside signs have disappeared from the web, but if you look you can still find some. It's surprisingly easy and it doesn't take much in the way of fancy equipment. Basically the signs have some design flaws from a security point of view which are easy to exploit.