Hackpads are smart collaborative documents. .
878 days ago
Unfiled. Edited by Andrew Gill 878 days ago
Proposed Higher 
National Unit specification
Unit title: Ethical Hacking Fundamentals

870 days ago
874 days ago
Unfiled. Edited by Andrew Gill 874 days ago
Andrew G The two techniques above assume that the targets are usually external, however for internal testing it can be useful to sniff the network traffic with a tool like wireshark to passively gather information floating on the ether such as usernames, IP addresses and even sometimes passwords!
Next step from gathering your information and data is to use it, mainly if you have gathered IP addresses and they are within scope, this is the time to poke at them for running services and open ports. Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts.
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack-based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.
Maintaining Access/Post Exploitation
Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes, hackers harden the system from other hackers or security personnel by securing their exclusive access with backdoors, rootkits, and Trojans. Once the hacker owns the system, they can use it as a base to launch additional attacks. In this case, the owned system is sometimes referred to as a zombie system. Additionally upon maintaining access, covering your tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms. Examples of activities during this phase of the attack include steganography, the use of tunneling protocols, and altering log files.
875 days ago
Unfiled. Edited by Dave Boelens 875 days ago
Dave B Jungle River email UHF VHF
One could also try to send the signals via radio. Slow but capable of long range communication.
Projects like bushmail, airmail have been set-up and ships also use these type of systems when not having satellite communication.
I once used a 27MHZ radio to send data for my MSX computer to other users.
It was slow but worked.
For Telex and military uses radio is also used to send the signals why not use this.
This uses a software program, modem and radio to send messages across.
As the radio signals go through the air the interference from the trees in the jungle is less.
Trees cut down 2.4 mhz signals fast as the frequency is low.
For safe communication you could use your own personalised encryption of the signal as well.
The RFD900 is a high performance 900MHz, ISM band radio modem covering  the 902 - 928 MHz frequency band.  It is designed for long range serial  communications applications requiring best in class radio link  performance.
jD-RF900Plus, Longrange telemetry set
The  best thing on UAV/UGV telemetry market just got better.  This is our  new and upgraded UAV/UGV telemetry set for our famous RF900 set. New set  includes detachable USB and DF13 cables. Internal serial adapters and  new enhanced RFD900 Plus modems. 
New processor design on these  modems is a big game changer as modems are now capable for real-time AES  encryption.  
The kit consists of:
  • 2 x RFD900Plus Radio Modems with enclosures
  • 2 x Antennas, 915MHz Quarter wave monopole 2.1dBi
  • 2 x Antennas, 915MHz Half wave dipole 3dBi
  • 1 x USB cable
  • 2 x DF13 cable (For Pixhawk and for APM2.5/2.6)
Size of the enclosure without antennas: 70 x 40 x 23mm
Also there is a arduino shield as well so you are able to setup a low cost repeater station if not able to get the signal all the way.
World  record holder telemetry set on it's price-range. Australian High Air  Balloon team has reported ranges over 80km LOS. RFDesign AU reports  +25km ranges from urban city to countryside tests.
875 days ago
Unfiled. Edited by Dave Boelens 875 days ago
Dave B Challenge will be to get distilled water to the jungle to make sure these cells can keep working.
875 days ago
Unfiled. Edited by Dave Boelens 875 days ago
Dave B Power solar power does not have to be from direct sun light. This can also be harvested from reflection on the water. So if you are placing the solar panels make sure to measure at what angle the most power will be generated.
For cheap storage containers you could also use pvc pipes with screw on caps glued into place this is low cost and water proof wires can be put trough via watertight cable grommet placed into the pvc, screwed or glued into place. like this container https://www.youtube.com/watch?v=GUogyKl4IYE
877 days ago
Unfiled. Edited by Lisha Sterling 877 days ago
Lisha S You do Realize This Project is For Humanitarian Causes, Right?
I noticed that you wrote some sarcastic things and generally defaced a couple of pads on this set of hackpads set up for the RHoKSec at Hack In The Box. You may have a beef with one or more people involved with this event, but that's no reason to be a jerk. 
Geeks Without Bounds supports humanitarian open source projects through a combination of hackathons and an accelerator program. We, together with the fine folk at Scotland Hacks, will make sure that the various projects worked on over these last two days get the support they need to see the light of day. We're doing that in cooperation with SQA, Tripwire, Taarifa.org, the World Bank, and HFID (funded by UK AID). 
So, while you believe that you are doing something hilarious, in fact, you are defacing work that is rather important.
You might try being constructive instead of destructive. If you are a security engineer, then you probably could actually help in some way. That would probably help your career a lot more than petty mischief will.
Executive Director,
Geeks Without Bounds
(Most definitely NOT a N00b, by the way.)
Members (12)
Paul Mason Lisha Sterling Henk-Jan Buist Andrew Gill Dave Boelens Joe Frew Nirav Patel Stefano Sesia Thomas Tripwire, Inc. Richard Head Elisheva Sterling

Create a New Collection


Move XXX to XXX

XXX will be invited to the XXX on XXX.


Contact Support

Please check out our How-to Guide and FAQ first to see if your question is already answered! :)

If you have a feature request, please add it to this pad. Thanks!

Log in