Andrew GThe two techniques above assume that the targets are usually external, however for internal testing it can be useful to sniff the network traffic with a tool like wireshark to passively gather information floating on the ether such as usernames, IP addresses and even sometimes passwords!
Next step from gathering your information and data is to use it, mainly if you have gathered IP addresses and they are within scope, this is the time to poke at them for running services and open ports. Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts.
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack-based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.
Maintaining Access/Post Exploitation
Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes, hackers harden the system from other hackers or security personnel by securing their exclusive access with backdoors, rootkits, and Trojans. Once the hacker owns the system, they can use it as a base to launch additional attacks. In this case, the owned system is sometimes referred to as a zombie system. Additionally upon maintaining access, covering your tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms. Examples of activities during this phase of the attack include steganography, the use of tunneling protocols, and altering log files.
Projects like bushmail, airmail have been set-up and ships also use these type of systems when not having satellite communication.
I once used a 27MHZ radio to send data for my MSX computer to other users.
It was slow but worked.
For Telex and military uses radio is also used to send the signals why not use this.
This uses a software program, modem and radio to send messages across.
As the radio signals go through the air the interference from the trees in the jungle is less.
Trees cut down 2.4 mhz signals fast as the frequency is low.
For safe communication you could use your own personalised encryption of the signal as well.
The RFD900 is a high performance 900MHz, ISM band radio modem covering the 902 - 928 MHz frequency band. It is designed for long range serial communications applications requiring best in class radio link performance.
The best thing on UAV/UGV telemetry market just got better. This is our new and upgraded UAV/UGV telemetry set for our famous RF900 set. New set includes detachable USB and DF13 cables. Internal serial adapters and new enhanced RFD900 Plus modems.
New processor design on these modems is a big game changer as modems are now capable for real-time AES encryption.
The kit consists of:
2 x RFD900Plus Radio Modems with enclosures
2 x Antennas, 915MHz Quarter wave monopole 2.1dBi
2 x Antennas, 915MHz Half wave dipole 3dBi
1 x USB cable
2 x DF13 cable (For Pixhawk and for APM2.5/2.6)
Size of the enclosure without antennas: 70 x 40 x 23mm
Also there is a arduino shield as well so you are able to setup a low cost repeater station if not able to get the signal all the way.
Dave BPower solar power does not have to be from direct sun light. This can also be harvested from reflection on the water. So if you are placing the solar panels make sure to measure at what angle the most power will be generated.
For cheap storage containers you could also use pvc pipes with screw on caps glued into place this is low cost and water proof wires can be put trough via watertight cable grommet placed into the pvc, screwed or glued into place. like this container https://www.youtube.com/watch?v=GUogyKl4IYE
I noticed that you wrote some sarcastic things and generally defaced a couple of pads on this set of hackpads set up for the RHoKSec at Hack In The Box. You may have a beef with one or more people involved with this event, but that's no reason to be a jerk.
Geeks Without Bounds supports humanitarian open source projects through a combination of hackathons and an accelerator program. We, together with the fine folk at Scotland Hacks, will make sure that the various projects worked on over these last two days get the support they need to see the light of day. We're doing that in cooperation with SQA, Tripwire, Taarifa.org, the World Bank, and HFID (funded by UK AID).
So, while you believe that you are doing something hilarious, in fact, you are defacing work that is rather important.
You might try being constructive instead of destructive. If you are a security engineer, then you probably could actually help in some way. That would probably help your career a lot more than petty mischief will.