Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation since 12/29/24 in all areas

  1. How I Also Hacked my Car 2024-01-30T22:14:07+00:00 • goncalomb • hacking,car,dacia,rpi This blog post is kind of inspired by another that I saw on HN some time ago, "How I Hacked my Car". After praising the infotainment system of the car, a Hyundai IONIQ, the author ends up hacking it and running custom software on the head unit. Well, my much cheaper 2023 Dacia Sandero also has a decent infotainment system with navigation and wireless Android Auto. Even before I got the car, I searched around to see if the system was hackable. I was not surprised to find that a simple USB drive with an autorun.sh script gets run as root. A classic. Various forums around the web use this method to change skins and side-load navigation maps. I was not interested in that, my goal was also to run some custom software. Well, there is more to the story, otherwise, I would just that autorun.sh "feature". The Infotainment System The system is a MediaNav Evolution from Renault (which Dacia is a subsidiary of), built by LG (FCC ID: BEJLAN5900WR). It's a Linux box. Over the years there have been various iterations of this system, the older devices used WinCE. The navigation part of the software is by a company called NNG (iGO?). Apparently, they provide navigation software for many other devices. MediaNav Evolution (unofficially called MediaNav 4) The autorun.sh Just by looking around on various forums, I knew of 3 special files that when placed on a USB drive would trigger some debug functions: autorun_bavn/autorun.sh: a script that gets run as root logfiles_bavn: a directory that gathers various system logs and files usb_logging: a directory where the system continually dumps dlt files (proprietary log system) One good thing about the log files is that they contain the Wi-Fi password for the AP. This password can be reset on the UI, but it's never visible. Knowing the password allows other devices to connect to it (e.g. PC). When using wireless Android Auto it connects automatically, I think it bootstraps using Bluetooth. I was most interested in the autorun.sh... But it was not working, I couldn't get the script to run. The Firmware At this point, I decided to start inspecting the firmware to see what was wrong, and if there was another way in. My device came with version 6.0.9.9. I wanted a recent update file, but the official website doesn't provide a direct download. It requires installing a desktop application, "Toolbox", which I ended up doing. The application can be used to buy map updates or download firmware/OS updates for free. The procedure starts with collecting some information about the system/car to a USB drive. After connecting it to a PC, the "Toolbox" software detects a new update and puts the new update file on the drive. I didn't update it, I just wanted the file, it was version 6.0.10.2: >: file upgrade.lgu upgrade.lgu: POSIX tar archive (GNU) I also had an older update file, version 6.0.9.7, that I found in some random forum. Sometimes even grep can be a great analysis tool. Just by running grep -RF autorun.sh on the contents of both the new and old firmware, I could see that the new one had no matches. Time to load Ghidra and see what's going on... Version 6.0.9.7 has the autorun.sh feature, but it is not present on version 6.0.10.2 Comparing the 2 files it was evident that they had removed the autorun.sh backdoor. Even though I didn't have the specific firmware for my installed version (6.0.9.9), it was clear that mine didn't have it and that's why I could never get it to work. This miscmanager file is also responsible for the other USB debug features, these are all still there. The core OS appears to be from GENIVI/COVESA (GitHub: GENIVI/COVESA). I'm not familiar with these systems at all. They have a fair bit of open-source stuff that will probably explore in the future. I decompiled other binaries to try to look for some other interesting stuff. Found a lot of D-Bus stuff, that will be useful for getting vehicle information when I can run my own software. But my goal was to get root access first. One way would be to craft a new update file with a backdoor, which would require reverse engineering the whole upgrade procedure, and as expected the update files do have some signature hashes that presumably need to match. Getting root access directly would be the preferred way. The Android Update App Something I noticed on the official website was that they were promoting a new way to update the maps, using an Android phone app. Could this be my way in? The description on Google Play promises to "Eliminate the Sneaker Network", an expression that I had never heard, in reference to not requiring a USB drive. Of course I didn't install it, there is no point in that. I just searched the id com.nng.pbmu.dacia on Google to find one of the many sites that offer the .apk file for download. I'm not an Android developer, I just know that deep inside there is some bytecode that traces its root back to Java, and I know Java. I don't care about Dalvik, ART, Zygote, or whatever. Just give me those Java classes. Over the years I've decompiled a few Android apps, my preferred way is just to unpack the .apk as a .zip (that's all it is), get the .dex bytecode files, run them through dex2jar to get some .jar files and open them with good old JD-GUI. Recently I've discovered jadx which provides a better experience for decompiling apps. To my surprise the app was quite complex, it appears to include some sort of native bindings, and most of the functionality is implemented in some kind of proprietary .xs scripts (similar to JavaScript). These are found on the app's resources. Android APIs are exported as modules to be used in the .xs scripts Several native libraries and .xs scripts It appears that the liblib_nng_sdk.so library is responsible for running these scripts, but I didn't explore it further. My goal was just to focus on what kind of protocol was used to update the maps on the device. And I found it in the file nftp.xs. NFTP!? Is it standard FTP? No, it's not standard FTP or any other known protocol that I could find. It's a new binary protocol for transferring files, implemented on these .xs scripts. The app then uses Android Open Accessory (AOA) as the transport layer for the protocol. AOA was totally new to me, but after some reading, it was clear that it is just a way of establishing a standard for an accessory to talk USB with an Android device. The names are confusing, the "accessory" is actually the USB host (in this case, the head unit) and the Android device is the USB peripheral. The Other Side The new update file that I had was version 6.0.10.2, which, according to the website, was the version required for the new update app to work. That naturally means that there is some specific service/code on that file to handle the update on the head unit side. After some digging, I found it. It's another set of .xs scripts, these run on a native interpreter. There is also a native binary, aoa2sock, that bridges the gap between USB (AOA) and the .xs scripts by providing a pipe for the transfer protocol. It's clear that this phone update feature is an afterthought, the binaries/scripts are not part of the standard upgrade filesystem, they are installed separately from a .ipk package file (yellowtool.ipk) when the system is updated. The internal name they use is YellowTool / YellowBox. And this is the only part of the entire system that is coded with these .xs scripts, everything else is just native binaries. Most of the system uses native binaries and Qt applications The mobile update app feature uses .xs scripts Being plain text scripts, it was relatively easy to understand what the protocol does and what kind of access it provides, even though the coding style is atrocious. Constructing The Backdoor At this point, just by reading the code, I was pretty sure that it was possible to write arbitrary files under the /navi directory, and that would give me full access if I carefully modified some files. I just needed to create a fake Android update app and connect using AOA. Well, as I said before, I'm not an Android developer, so I went with the next best thing, the Linux Kernel. As it turns out I'm also not a kernel developer... But I knew that it has something called gadget mode, where a device running Linux can act as a USB peripheral (instead of a host). Could I make a Raspberry Pi act as an Android device in AOA mode? Gadget mode can be configured from userspace using configfs (just by writing specific /sys/kernel/config/ files), this way does not require writing any kernel code, but it's limited to specific "functions" already implemented in the kernel (e.g. serial port, mass storage, ethernet adapter etc). Not unsurprisingly, that's how the guys at Google implemented AOA, they added a new "accessory" function to the kernel. They even tried to push it upstream, but it went nowhere, currently, it's not part of the Linux Kernel. I don't think it will ever be, it's probably too specific, and it's kind of a weird protocol. After reading more about AOA, it was clear that it involved a kind of handshake where the accessory asks the Android device for AOA, and after that, the device just acts like a serial port (a "raw" data pipe), and it's up to the developer to do the rest (this is a simplification, and there are other modes, read more). So maybe I could use the serial gadget function to fake an Android device already in accessory mode, without implementing the handshake. I also found the talk where they first announced AOA, back in 2011. It's a nice talk if you are into USB stuff: The Testing Setup The system is something like this: Android side: Update App / "nftp" (.xs scripts) <=> AOA <=> USB Head unit side: USB (host) <=> aoa2sock <=> "nftp" (.xs scripts) <=> [reads/writes system files] For testing, I used 2 Raspberry Pies. Because the head unit is ARM-based as is the Raspberry Pi, I was able to run the aoa2sock binary and .xs interpreter from the firmware, this simulated the head unit and acted like a USB host. The other RPi was the USB peripheral (using the On-The-Go, OTG port), which when configured correctly using the gadget mode, acted like an Android device in AOA mode. The smaller Raspberry Pi Zero 2 W can be powered from the OTG port and will act as the Android device After messing about with multiple gadget configurations, I was seeing some promising debug messages from aoa2sock, that's the binary extracted from the firmware that creates a pipe between the USB AOA and the weird "nftp" protocol (.xs scripts), on the head unit side. But it was not working... "No AOA endpoint was found": My fake head unit was not recognizing my fake Android device >: file aoa2sock aoa2sock: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-armhf.so.3, for GNU/Linux 2.6.32, BuildID[sha1]=XXXXXXXX, with debug_info, not stripped After inspecting the aoa2sock binary in Ghidra (thanks for the debug info) and reading the kernel code, I finally found the issue. The kernel serial port gadget uses a different USB subclass from the one used by AOA, and it can't be changed from userspace. Is this a bug? I think AOA is correct in using USB_SUBCLASS_VENDOR_SPEC for a generic interface OK... Let's patch the kernel I ended up having to download the kernel source and patch the f_serial.c gadget function to change the USB subclass. After compiling the kernel module and loading it using modprobe, it finally worked and the aoa2sock binary recognized the device. My fake Android device was finally connected to my fake head unit Can I call myself a kernel developer now? All that was left to do was to somehow recreate that "nftp" protocol. I didn't really want to use the proprietary .xs files implementation, so I wrote my own in Python. At this point, I had all the pieces and the Raspberry Pi now replaced the Android app: Raspberry Pi side: Python Script ("nftp" implementation) <=> USB Gadget Mode (emulates AOA) Head unit side (same as before): USB (host) <=> aoa2sock <=> "nftp" (.xs scripts) <=> [reads/writes system files] Creating the backdoor involved issuing "nftp" commands to edit a specific file under the /navi directory and inject a call to a bash script, this bash script (also uploaded using "nftp") contains the payload that runs as root. H4cking Time After much testing with my dual RPi setup, I was confident that it was going to work... Raspberry Pi Zero 2 W (OTG port) connected to the infotainment head unit Setting up for an update... Ready to "Update with Phone", that option is only available after version 6.0.10.2 Waiting for a phone Time to put the RPi in gadget mode (I was connected to it using SSH)... Sorry, it's not a phone and we are not sending any maps Sending and running the payload... Got it! Success! I had root access. That payload is just call to a specific D-Bus method that I found while analyzing the firmware, it shows a popup with custom text and title. The text is the output of the id command. Finally, after replacing the payload with something more useful, a simple socat bind shell and connecting back to it using Wi-Fi, I had full access. Give me that root shell If you didn't follow it all the way, here's a summary: I used a Raspberry Pi in USB gadget mode to simulate an Android device connected to the head unit. The head unit thinks it's accepting a navigation maps update from the "phone", but because the update protocol allows for arbitrary file changes, I can issue commands to modify a specific file and inject a call to a bash script that gets run as root. Code Please Everything is on GitHub with more detailed instructions (it contains no proprietary code). The key pieces are my implementation of the "nftp" protocol and the gadget configuration. What's Next? This is just the beginning, now it's time to really explore the system. First, I'll probably end up restoring the autorun.sh functionality, with a custom service, because I think that's the easiest way to load software. That way I can keep all the new stuff on the drive and make as few changes to the system as possible. One of the main things I would like to do is record car parameters, stuff like speed, fuel, location etc. It remains to be seen if I can easily access that information through D-Bus, or if I need to go deeper. I'm not interested in adding anything that requires my attention while driving. But that's for another time... Some Extras (Could I have used SSH?) Two ports are open by default on the head unit, an SSH server, and some Apple service, probably related to CarPlay (Server: AirTunes/320.17.6), I didn't really explore that. But I tried cracking the /etc/shadow root password from the update file using hashcat / john with some rules and password lists. I'm not an expert doing this at all, I don't even know if I was doing it right, and was not successful. Not that it matters now, I could just change the root password or add a new user. SSH on port 22 / AirTunes/320.17.6 on port 7000 Sursa: https://goncalomb.com/blog/2024/01/30/f57cf19b-how-i-also-hacked-my-car
    5 points
  2. Prima regula care nu se aplica doar in security, ci si in multe alte lucruri, inclusiv fotbal sau mai stiu eu ce e urmatorul: sa iti placa ceea ce faci. Daca o faci pentru bani, slabe sanse sa ai succes. Daca iti place o sa pui si osul la treaba care e urmatorul pas. Sa inveti. Mai intai cate putin din fiecare, apoi extinzi ceea ce stii in functie de necesitati.
    4 points
  3. Raman uimit de faptul ca oamenii au uitat ca cea mai sigura metoda de comunicare ramane telepatia si apeleaza la tot felul de aplicatii online pentru a purta discutii sensibile. De ce nu ne intoarcem la vechile practici ale stramosilor nostri daci? Nu are relevanta daca esti mafiot, vizigot, ostrogot, conteaza sa proiectezi informatiile dobandite din apa catre subconstientul interlocutorului.
    3 points
  4. Probabil peste 10 ani nici notificare la 6 dimineata nu iti mai dau. Te trezesti direct in Desert pe undeva ca in Mad Max si o drona e trimisa spre tine sa te extermine ca cica esti Cyber Terorist.
    3 points
  5. Nu chestiile de baza. Sa-l mananci pe paine. Sa ai cunostinte extinse despre sisteme de operare, daemoni, cum functioneaza, cum se configureaza, ce limite/lipsuri are/au, sisteme de fisiere, kernel, kernel signals, aplicatii web, networking, tehnologii programare web, limbaje diferite, baze de date si lista ramane deschisa. Poti citi si cate ceva pe aici. Stiu, este informatie veche si poate unii o sa considere ca e "deprecated", insa cred ca e un bun start, cel putin referitor la atitudine si inceputuri. Hackingul nu se rezuma la folosirea unui tool si nu e ce crede coaie asta de mai sus
    3 points
  6. Banii se fac muncind, legal. Sau inseland, furand sau efectuand alte activitati - ilegal. Grupurile la care te referi probabil sunt niste mizerii piramidale din care nu o sa faci bani, o sa pierzi inutil mult timp.
    3 points
  7. https://www.youtube.com/@xct_de/playlists https://www.youtube.com/@ippsec
    2 points
  8. Pentru practica, recomand platforme destinate acestui scop + sa urmaresti oameni care au video-uri in care explica ce si cum se intampla. Cateva exemple clasice ar fi: - Hack the Box (https://www.hackthebox.com/) - TryHackMe (https://tryhackme.com/) - picoCTF (https://picoctf.org/) - OverTheWire https://overthewire.org/wargames/ Ca si canale, pe vremuri il urmaream pe tipu' asta: https://www.youtube.com/@_JohnHammond insa sunt sigur ca poti gasi multi altii pe placul / stilul tau. Spor la invatat
    2 points
  9. Sters de autor. M-am razgandit si nu il mai las public 7 zile. Sorry guys
    2 points
  10. Înțeleg frustrarea ta, dar fiecare alege drumul pe care îl consideră cel mai potrivit pentru el. Ethical hacking și cybersecurity sunt domenii care nu doar că aduc venituri, dar contribuie și la un internet mai sigur. Criminalitatea cibernetică poate părea tentantă pentru un câștig rapid, dar riscurile și consecințele pe termen lung sunt enorme. Poți să faci bani și să-ți construiești o carieră solidă fără să îți compromiți integritatea.
    2 points
  11. ai votat cu lasconi, pacatosule care esti. Interlocutorul pacatos nu a ajuns sa cunoasca slava si imparatia apei 🤣
    2 points
  12. Uhm, ar fi misto daca am avea mai multe dezbateri de genu' asta. Chiar m-a tinut prins vreo 7 minute Adevaru' e probabil undeva la mijloc, iar problema principala cu aplicatiile astea moderne (d.p.m.d.v) este lipsa de educatie si increderea in servere. @koteri3692 - are dreptate din perspectiva existentei unei vulnerabilitati potentiale în aplicatiile E2EE care nu educa utilizatorii sa verifice manual cheile publice. Totusi, aceasta vulnerabilitate nu este o problema a criptografiei in sine, ci a implementarii și utilizarii acesteia. Intr-adevar, dacă Fane Pedala nu verifica manual cheile publice, un server compromis poate introduce o cheie falsa ==> atac MiTM. MiTM este posibil daca serverele sunt rau intentionate sau obligate sa colaboreze cu agentiile guvernamentale. @Nytro - este corect in teorie (exista mecanisme ex. certificare, verificare manuala care pot preveni atacurile MiTM). Insa aceste mecanisme nu sunt întotdeauna implementate sau utilizate corect în practica. Ceva exemple concrete: Signal permite verificarea manuala prin scanarea codurilor QR intre utilizatori. Verificarea asta face ca atacurile MiTM sa fie aproape imposibile, dar majoritatea utilizatorilor ignora acest pas. WhatsApp oferă opțiuni limitate de verificare a cheilor. Aplicatiile E2EE precum Signal nu utilizeaza CA-uri pentru a verifica cheile publice. In schimb, Signal se bazeaza pe trust local și pe verificari manuale. Așadar argumentul lui Nytro nu se aplica direct aplicatiilor de mesagerie. Legat de faptul ca NSA poate face MiTM pe TLS: este posibil în anumite conditii ex. compromiterea DigiNotar sau alte incidente legate de BGP hijacking bla bla. In ziua de azi, browser-ele moderne includ masuri ca HSTS (HTTP Strict Transport Security) și Certificate Transparency Logs pentru a preveni asta In aplicatiile de mesagerie astea nu exista, iar încrederea se bazeaza mai mult pe server. So my humble opinion: ce zice koteri3692 este un scenariu tehnic real, dar oarecum teoretic. Nytro subliniaza soluții valide, dar neaplicabile complet în lumea reala fara eductia corespunzatoare a userilor. pwp jos hacerii mei preferatzi PS: io nu-s hacer si imi place shaorma cu de toate
    2 points
  13. Pe vremea aia era inca parfum. Google isi punea armata de avocati sa blocheze cererile respective si doar daca se ingrosa treaba dadeau informatiile mai departe. Iti trimiteau din timp o notificare prin care te avertizau ca a fost facuta o cerere legala sa dea mai departe informatiile pe care le au despre tine. Acum primesti notificare doar la 6 dimineata cand iti bat mascatii la usa.
    2 points
  14. Acum eu cred tu confuzi ceva. Exista doua tipuri de Man in the Middle si tu te gandesti ca doar unul exista. Atacul 1. Man in the Middle prin care NSA, ISPs schimba certificatul SSL prin care compromite domeniul whatsapp.com si te redirectioneaza catre un serverul administrat de NSA. Eu nu vorbeam de acest scenariu. Plus ca e in scenariu mai complicat ca totusi si serverul whatsapp ar trebui sa aibe baza de date si sa fie actualizat cu noul cod sursa al serverul web ca sa nu existe probleme de compatibilitate. Atacul 2. Man in the Middle prin care serverul whatsapp targheteaza anumiti utilizatori (gen Alice sau pe Bob) prin care inlocueste cheile publice a celor cu care comunica respectivii. Cred ca tu nu iei in calcul ca exista doua tipuri de atacuri bazate pe Man in the middle. Eu cand am inceput sa vorbesc de MiTM pe whatsapp, vorbeam de atacul nr 2. Ulterior am vorbit cum NSA poate sa compromita si certificatele SSL. Dar NSA nu s-ar chinui asa de rau ca META si Zuckerberg suge pula NSA-ului in fiecare zi.
    2 points
  15. Doar daca erai angajat la NSA si aveai access la platforma XKeyScore. Din cate am inteles XkeyScore e accessibil si in Europa dar nu access la toata baza de date. Dar din cate as crede nu cred ca ai access la platforma XKeyScore. Mai incearca sa iti reamintesti parola.
    2 points
  16. Nu sunt rusnac dar tu pe ce planeta traiesti bro?? Posibil Putin a comandat asasinarea la vreo 20-50 de oameni in cei 30 de ani. Iar aia care i-a asasinat sunt dizidenti (adica s-au transformat in anti putinisti). Probabil majoritatea disidentilor ucisi sunt fosti securisti rusi sau cine stie dubli? Tu crezi ca Rusia ucide orice fraier de Gigel care e patron la o bruterie ca pe VK Gigel a incarcat o poza cu pomul de craciun de la new york city si scrie "as vrea sa fie si la moscova la fel ca in Amerika" Europa si America nu asasineaza, doar baga oameni la puscarie asculand telefoanele lor, citind emailurile si mesajele de pe facebook fara mandat si ii santajeaza daca au amante, probleme medicale, depedente de droguri etc. Daca esti jurnalist, om de afaceri, influencer te cheama pe la DNA cu subsemnatul in fiecare zi sa te filmeze aia de la PROTV. Uite un exemplu clar din Romanica. Dorian Popa stiu ca e consumator de iarba de vreo 10 ani. Gaborii au aflat ori de la dealer ori ascultand telefoanele ca el consuma. Ei stiau ca isi cumparase marfa. Stiau ca THC-ul ramane in sange vreo 2-3 saptamani. Aveau ceva confirmare ca fumase recent. Pe urma au parcat o masina de politie pe langa Hatz Residence si cand l-au vazut pe Dorian Popa, hop poc au aprins girofarele. Trage pe dreapta si parea ca e un filtru obisnuit. Dar gaborii stiau de la bun inceput, Dorian Popa era pont sigur. In presa pe urma a aparut: "la un filtru al politie Dorian Popa a iesit pozitiv la canabis". De unde stiu? Dorian Popa trb sa mearga cam un km pana la cel mai apropriat magazin. Si s-a gandit hai ca ma duc in halat sa imi cumpar plm ceva. Asa prind astia de la DIICOT toti traficantii din Romania. La pont sigur 95% din cazuri. Mai exista si coincidente. Daca nu ar exista coincidente ti-ai dat seama 100% de holograma. Daca tot nu iti gasesc nod in papupera si esti o persoana importanta, iti inchid conturile de Twitter, Facebook, Instagram vezi Andrew Tate, Trump. Lui Tate i-au blocat pana si contul cei de la uber. Trump acum 5 ani i-au inchis contul de Facebook si Twitter, iar acum patronu Facebook il linge in cur pe Trump. Tu nu vezi sau esti orb? Cand statul nu obtine ce vrea, incepe sa se ocupe de tine. America a prestat asasinari la un click distanta ( din drona ) la sute de mii de cetateni de mana a doua din Orientul Mijlociul. Ai auzit de Wikileaks si scandalul cu jurnalistii care au fost omorati din blackhawk ca au crezut ca aia au ak-47 iar in realitate aveau camere de fotografiat ? Mosadul prin anii 80-90 ucidea palestineni prin hotel prin germania. Causescul prin anii 80 comanda si el asasinate cu Carlos Sacalul la jurnalistii care lucrau indirect pt CIA (si finantati prin programele USAID) de la Europa Libera. Qasem Soleimani a fost asasinat cand era in Iraq la ordinul lui Trump din drona in 2020 fara tribunal si dovezi concrete. Era generalul iranian terorist? Ce inseamna terorist? Daca el era terorist era si Ceausescu terorist inainte de 89 ? Doar ca nu se futea in cur cu Ronald Regaon. E Putin terorist? Arabia Saudita a omorat un jurnalist intr-o ambasada in anii 2020. L-a hacuit pe ala in Ambasada si l-a si transat ca mafiotii din New York. Acolo e mirajul, ca daca nu auzeai de nici unu care facea milioane dintr-o aplicatie pe playstore sau dintr-un rahat mic, etc.. atunci stiai sigur ca statul controleaza toate mega corporatiile si controleaza monopolul.... daca conductele economice nu ar fi fost atat de alambigate si imbarligate, holograma nu ar mai fi existat si toata lumea stia ca nu e mare diferenta intre Rusia Totalitara si America Totalitara. Daca esti o persoana importanta, iti fac americanii cu un click man in the middle pe Whatsapp si Signal. Oare de ce dracu toate produsele americane sunt gratuite pt toti prostii ? Ca tu esti produsul. De unde dracu crezi tu ca "jurnalistii independenti" gen Recorder, OCCRP au bani de salarii pentru zeci de oameni si informatii bomba... in realitate ei sunt jurnalisti platiti de americani si au materiale intelligence direct de la americani. Ce dracu crezi ca fac zeci de mii de functionari in Pentagon incluzand vorbitori de limba romana acolo ? Cand nu au ce sa iti faca apari prin blogurile de la OCCRP.
    2 points
  17. Nu citesc niciodata despre cum sa faci bani. Am alte pasiuni, cat despre bani, sunt suficienti da-i in ma-sa. Nu sunt vreun barosan, dar nici lipit. Ajunge ce este Oricum, subiectul e altul, nu are sens asocierea. Ce faci tu, e treaba ta ... nu sunt eu in masura sa dau sfaturi la cineva sau sa judec. E alegerea fiecaruia O zi faina la toti!
    2 points
  18. Fratele meu daca ai cum transmite-i celui care a venit cu ideea sa contopeasca UiPath StudioX cu UiPath Studio ca imi bag pula in rasa lui si ca sper sa ii moara toata familia de la strabunici si pana la plozii pe care ii va avea vreodata. Celor care au facut implementarea si au omis sa migreze toate features din StudioX le doresc un cancer care sa ii chinuie 20 de ani. Si pentru cei care se ocupa de documentatia aia outdated mi-as da 10 ani din viata ca sa le tai degetele in slow motion. Love you.
    2 points
  19. mi au respins prima data 3 bug-uri ca is false pozitive si apoi le au patchuit. https://identity.bugcrowd.com/login?user_hint=?./+___/../ asta e cadou.eu nu mai am sqlmap, metaspolit.dar e sqli, e lfi, e shell.
    1 point
  20. Salut, probabil practica. Ideea e ca nu o sa stii sa le rezolvi. Dar incercand sa le faci, o sa inveti multe lucruri. Asta e beneficiul principal al CTF-urilor din partea mea. De asemenea, dar numai dupa ce incerci, cauta write-ups si reprodu-le. Gasesti o multime de resurse.
    1 point
  21. Google, Harvard, and more are offering FREE AI courses (no payment required) Here are 8 FREE courses to master AI in 2024: 1. Google AI Courses Google offers 5 different courses to learn generative AI from the ground up. Start with an Introduction to AI and finish having a solid understanding of AI as a whole. 🦾 https://lnkd.in/eW5k4DVz 2. Microsoft AI Course Microsoft offers an AI course that covers the basics and then more. Start off with an introduction and continue through learning about neural networks and deep learning. 🦾 https://lnkd.in/eKJ9qmEQ 3. Introduction to AI with Python Harvard University is offering a full 7-week course to explore the concepts and algorithms of AI. Start with the technologies behind AI and end with knowledge of AI principles and machine learning libraries. 🦾 https://lnkd.in/g4Sbb3nQ 4. Prompt Engineering for ChatGPT This 6 module course by Vanderbilt University offers beginners a starting point to writing better prompts. Start by learning effective prompting and complete the course knowing how to bend ChatGPT to your will. 🦾 https://lnkd.in/d-rCb-AM 5. ChatGPT Prompt Engineering for Devs OpenAI in collab with DeepLearning is offering this course taught by Isa Fulford and Andrew Ng. Start off with best practices and finish with a better understanding of prompting with hands-on practice. 🦾 https://lnkd.in/gtGc5Znp 6. LLMOps Google Cloud in collab with DeepLearning is offering this brand new course taught by Erwin Huizenga. Go through the LLMOps pipeline of pre-processing training data and adapt a supervised tuning pipeline to train and deploy a custom LLM. 🦾 https://lnkd.in/gMXDr7MJ 7. Big Data, Artificial Intelligence, and Ethics In this 4 module course, the University of California - Davis covers big data and introduces IBM's Watson. Start by learning about big data opportunities and end knowing the limitations of AI. 🦾 https://lnkd.in/gVEf3Dvm 8. AI Applications and Prompt Engineering edX has an introductory course on prompt engineering that goes beyond the basics. Start by learning the basics and end knowing how to create your own applications. 🦾 https://lnkd.in/g2P9U_Bs Take Coursera courses without the trial: First, go to the course you want to take and click 'Enroll for free', then 'Audit the course'. Note: You'll need to create an account to take courses, but won't need to pay anything. Share + Comment more courses so others can benefit! ❤️ Follow us There's An AI For That for more helpful posts like this. 🙏 Via: https://www.linkedin.com/feed/update/urn:li:activity:7170235664427397121/
    1 point
  22. Clientii intreaba de obicei pe forumuri. Nu prea se gasesc servicii de genul care sa nu fie tepe, asa ca este cerere mare si oferta putina.
    1 point
  23. Fura curent cumatru', s-a ajuns la un nivel cu acele ilegalitati online intrucat te ia dupa sifoane si ponturi, in rest, se tin la sertar dosare. Se face munca de chinez cu scamuri sparte, fac 3 lei, trag 2 linii, beau 2 sticle de votka si saptamana urmatoare is filati rand pe rand urmand ca, in vremuri de seceta, DIICOT mai marcheaza 5-6-12 goluri. La urma urmei, le trebuie si lor activitate, nu pot sa ii ridice pe toti odata dar asta nu trebuia sa zic. 🙃 Spor la cioarda baieti, faceti stocuri cu baxuri de tigari, aia e moneda de schimb acolo, restul ne mancam linistiti omleta dimineata si ne bem seara berea; si de facem vreo prostie, o facem (doar) singuri.
    1 point
  24. Comentati pe subiectul asta ca sa va creasca stima de sine 😂 Voi stiti doar despre lucrurile care s-au facut publice. Si da, tot ce a fost publicat a fost doar despre "hackerii" care au facut gainiarii. Au fost si baieti foarte destepti care au luat-o pe calea buna si acum au companii in domeniu sau lucreaza pentru companii foarte mari.
    1 point
  25. Sefule exista si posibilitatea nu sa schimbe cheia publica, ci sa iti fure cheia privata. Daca ti-ar schimba cheia publica a contactului ar fi usor sa iti dai seama daca o verifici in fiecare zi. O alta metoda usoara ar fi sa adauge inca un contact invisibil in grup. Cel mai probabil asta fac ca sa fie mai stealthy. Astept acum un topic sa imi se aprobe prin care dovedesc ca aplicatiile de chat E2EE sunt compromise garantat.
    1 point
  26. Nu ai inteles, dar incepe sa se lege treaba. 1. Partea de criptare se realizeaza prin criptare simetrica unde cheile se schimba folosind cheia asimetrica 2. Partea de trust, de verificare, se realizeaza prin certificate sau semnaturi digitale Criptografie nu inseamna doar AES ci ai: criptare simetrica, asimetrica, semnaturi, hashuri, hmac-uri, certificate, authorities etc. De aceea procesul, normal, nu e doar cum am mentionat eu, doar am dat un exemplu basic. Asa cum pentru a obtine un certificat pentru "rstforums.com" a trebuit sa demonstrez ca am acces la rstforums.com (verificarile unui Root CA pentru a oferi un server certificate), asa aplicatiile precum WhatsApp sau altele au mecanismul lor de verificare prin SMS (de exemplu). Stiu ca era o aplicatie la care scanai un cod QR de la cealalta persoana pentru aceasta relatie de trust. Acest trust e un certificat - adica legatura intre o cheie publica si un utilizator, o identitate. Cum se intampla in browser, desigur, ai la baza acele Root CAs si intr-adevar, unele pot sa fie controlate de catre autoritatile americane, ruse, chineze sau orice altceva. Dar sunt si mecanism in place, inclusiv in browsere. Daca se schimba un certtificat, browser-ul nu permite accesul. Ce putin temporar. Revenind la WhatsApp, sau alte aplicatii desktop, modul de implementare nu e acelasi. Nu ai un Root CA care genereaza acele chei publice si private. Cheile sunt generate local, de catre telefon. Iar daca relatia de trust se face intr-un mod sigur (e.g. cum vezi cheia publica GPG a unuia pe Twitter-ul lui, sau ti-o da pe hartie), atunci totul o sa fie in regula, nimeni nu o sa poata face nimic. Se pare ca public key fingerprints sunt ceea ce foloseste Signal Protocol de exemplu. Tu pierzi din vedere tot acest proces si vezi lucrile la modul simplu in care se schimba niste chei publice, faci MiTM si kaboom, ai acces. Nu esti singura persoana care s-a gandit la asa ceva. Revenind la partea de monitorizare in cazul in care NSA are acces la root CAs, exista solutii simple: own PKI. Se pot genera usor root CAs, se pot verifica certificate emise si tot asa. Daca vrei sa comunica "secure" cu un server, o poti face, trecand peste orice paranoia, folosind aceasta metoda (de exemplu). Adica tu consideri trusted doar acel root CA. Criptografia ajuta mult, trebuie doar inteleasa si facuta corect. Si nu te mai supara atat ca nu are sens.
    1 point
  27. Pot lua datele plimbate live, nu cele stocate. Ma rog, e alt subiect Nici eu nu folosesc, nici macar vpn. Ce sa ia? pozele cu cafea si troleala?
    1 point
  28. Da, complet de acord, peste tot se intampla asa. Dar asta doar cu datele pe care le au firmele. Daca firmele nu au date, nu au ce sa ofere. Cam asta e baza pe care ar trebui sa mearga persoanele ca Gigel de mai sus, PhD in cryptography. Sau, solutia cea mai simpla: nu face mizerii si nu ai de ce sa iti faci griji. Daca toate datele mele de pe Internet ar ajunge publice, probabil ar fi maxim 2-3 zile de mici caterinci si asta ar fi tot.
    1 point
  29. Pe mine ma intereseaza curvele eliptice din ecdsa Frate, am o curiozitate, trecand peste it si rahat: Chiar crezi ca astia nu aduna date si americanul e de fapt sfantul pe pamant? Au interceptat inclusiv parlamentul german (bine, astia la cat sunt de prosti, probabil cred ca au facut-o din dragoste)
    1 point
  30. Whatsapp, Signal si Telegram folosesc criptare asimetrica. Cheile publice sunt distribuite de catre serverele lor. Ei au capacitate sa faca MAN IN THE MIDDLE sa iti inlocuiasca cheia publica si sa iti compromita criptarea. End of story.
    1 point
  31. Ca sa intelegi cum functioneaza defapt masinaria Statele Unite ale Americii si holograma din spatele masinariei o poti intelege privind din exterior un alt sistem socio-economic (care a esuat lamentabil) dar care functiona minimal (avea banca centrala, moneda, inflatie, fabrici, facea importuri si exporturi). Poti intelege iluzia din spatele masinariei si privind catre state mai mici cum ar fi Republica Moldova sau alte tarii mai sarace in care sunt mai putini actori "privati" si iese la iveala cum bancile, bursa, firmele mari sunt coordonate direct si indirect de catre elemente ale statului respectiv. Trebuie sa fii si fin observator. Discutia a venit de la faptul ca "Tipa e smechera. E top. " si eu ti-am spus ca o mare parte din acesti ethical hackers de o ard pe la conferinte lucreaza direct sau indirect (fara sa stie) pentru diverse state promovand o alta narativa.
    1 point
  32. A significant portion of Europe's renewable energy production can be remotely controlled via longwave radio. While this system is intended to stabilize the grid, it can potentially also be abused to destabilize it by remotely toggling energy loads and power plants. In this talk, we will dive into radio ripple control technology, analyze the protocols in use, and discuss whether its weaknesses could potentially be leveraged to cause a blackout, or – more positively – to create a city-wide Blinkenlights-inspired art installation. With three broadcasting towers and over 1.3 million receivers, the radio ripple control system by *EFR (Europäische Funk-Rundsteuerung) GmbH* is responsible for controlling various types of loads (street lamps, heating systems, wall boxes, …) as well as multiple gigawatts of renewable power generation (solar, wind, biogas, …) in Germany, Austria, Czechia, Hungary and Slovakia. The used radio protocols Versacom and Semagyr, which carry time and control signals, are partially proprietary but completely unencrypted and unauthenticated, leaving the door open for abuse. This talk will cover: - An introduction to radio ripple control - Detailed analysis of transmitted radio messages, protocols, addressing schemes, and their inherent weaknesses - Hardware hacking and reversing - Implementation of sending devices and attack PoCs - (Live) demonstrations of attacks - Evaluation of the abuse potential - The way forward Licensed to the public under http://creativecommons.org/licenses/by/4.0 URL: https://media.ccc.de/v/38c3-blinkencity-radio-controlling-street-lamps-and-power-plants
    1 point
  33. boss, in primul rand trebuie sa inveti cine poate sa te caute si in al doilea rand sa inveti cum sa nu te prinda. Trebuie sa intelegi gravitatea faptelor tale si la cel nivel te vei regasii: DIICOT, Europol, FBI. Ca sa nu te prinda, citesti cum i-au prins pe altii inaintea ta. Posibil dupa vreo 5 ani de studiu vei gasii mai multe afaceri in domeniul cybersecurity foarte profitabile. Un hacker nu poate sa devina bancomat fara sa manance programarea pe paine dimineata, la pranz si seara. Bafta.
    1 point
  34. Nu stiu la ce spuii tu combinatii, sunt anumite forum-uri ce iti ofera educatie sa faci bani. udemy este unul din ele, ei vand un serviciu. Ei te invata anumite servicii. Restul depinde de tine. Sunt oameni care vand informatii, informatia costa... Pentru a face bani ai nevoi de bani. Asta ii de cand lumea si pamantu... EX: iti ofer eu un plan managment care include si marketing pentru o florarie. Ideaa este ca tu ai bani sa deschizi, eu nu...Dar eu am informatia, ce tu nu o ai. Nu toate sunt teapa, dar iti recomand sa te feresti de aia care iti zic ca vei face mii de euro, bani usor...
    1 point
  35. Nitro enjoy your time off among family n friends.
    1 point
  36. Te pup. Un an nou fericit tie si celor apropiati, si cat mai nefericit celor care au stricat StudioX ❤️
    1 point
  37. O sa ma uit pe 8 ian cand ma intorc la treaba.
    1 point
  38. (refresh) ANAF a descoperit că PNL a plătit o campanie care l-a promovat masiv pe Călin Georgescu pe TikTok - Snoop Ai dreacu rusi au mai fost romanii astea.. 😂😂
    1 point
  39. Hackeri sau nu, unii au făcut bani căruța. Trebuie aplaudați pe cei care si-au riscat pielea si au făcut bani. Trebuie sa învățam si de la cei care au căzut la ani grei.
    1 point
  40. Nu au existat niciodata, au fost doar ceva scammeri, multi au fost saltati, au ramas putini cu ceva bani dar nu tocmai averi care s-au dus pe masini si altele clasice.
    1 point
  41. 1 point
  42. Bro, am vizitat Saint Petersburg, Moscova si cateva orase pe acolo pe care nu le mai retin (in urma cu ~20-21 de ani, plus, am lucrat 4 luni in Rostov trimis de o firma. Experienta a fost foarte ok la ei. Nu intru in polemici, dar mie mi se pare ca doar unul cel putin sarit de pe fix si mai extremist, chiar ar face treaba in haznaua aia de tara ude totul tinde sa se darame sub propria-i greutate Referitor la UE, ti se pare o chestie democrata? Uita-te cate abuzuri si fraude s-au facut, chiar in parlamentul european. Sa nu mai zic, Ursula este de profesie ginecolog. Adica politica UE e condusa de una care verifica cu totul altceva pe vremuri :)))))
    1 point
  43. Cum e fratilor? Unde e democratia? 5 oameni s-au pisat pe milioane de romani. Din pix. Lovitura de stat fara armata, fara nimic. Indiferent cu cine ati votat sau ce favorit ati avut. Democratia s-a dovedit o carpa de sters la cur, asa cum spuneam "Ministrul Justiției: Românii trebuie să voteze în cunoștință de cauză, să afle adevărul despre ce s-a întâmplat" Romanii ar trebui sa-i alerge si sa-i incendieze, baga-si-ar pula in ea de capusala. Sa dea socoteala pentru toti anii de hotie, pentru coruptie, nepotism si 7 generatii din familiile politicienilor ce ar fi trebuit sa-si serveasca tara sa fie batuti in cuie, rastigniti si incendiati.
    1 point
  44. Pacat ca monedele alea, bitoin cum le ziceti, nu intra in carucioarele de la Lidl.
    1 point
  45. In lumea noastra, la specimene de genul le spunem escroci. Ei se considera hackeri 🤣 Ma bucur ca ai pus titlul prin care iti faci descrierea, fie ea si putin eronata. Lasa-ne ma nene cu sfaturi dinastea. Vezi-ti de banii tai, de cartela ta reincarcabila de la vodafone sau ce valori consideri tu ca ai. Pentru noi esti doar un tomberon de gunoi.
    1 point
  46. Teaser urmatorul sezon: Laviniu revine in forta pe forum si ne explica cum a zburat cu avionul privat in Bali pentru a cumpara o insula unde sa isi petreaca vacanta anul asta. Ajunge la concluzia ca Urus este pentru saraci; isi cumpara 6 supercars, toate roz. @mannnu afla ca a fost inselat de Laviniu si ca a luat hiv de la el.
    1 point
  47. Pentru producatori de muzica:: Content: 01. Vengeance Dance Explotion Vol.102. Vengeance Dirty Electro Vol.103. Vengeance Dirty Electro Vol.204. Vengeance Effects Vol.105. Vengeance Effects Vol.206. Vengeance Effects Vol.307. Vengeance Electro Essentials Vol.108. Vengeance Electro Essentials Vol.209. Vengeance Electroshock Vol.110. Vengeance Electroshock Vol.211. Vengeance Essential Clubsounds Vol.112. Vengeance Essential Clubsounds Vol.213. Vengeance Essential Clubsounds Vol.314. Vengeance Essential Clubsounds Vol.415. Vengeance Essential Dubstep Vol.116. Vengeance Essential House Vol.117. Vengeance Essential House Vol.218. Vengeance Essential House Vol.319. Vengeance Freakz On Beatz Vol.120. Vengeance Future House Vol.121. Vengeance Future House Vol.222. Vengeance Future House Vol.323. Vengeance Future House Vol.424. Vengeance Minimal House Vol.125. Vengeance Minimal House Vol.226. Vengeance Rhythm Guitars Vol.127. Vengeance Studio Vocals Vol.128. Vengeance Total Dance Sounds Vol.129. Vengeance Total Dance Sounds Vol.230. Vengeance Total Dance Sounds Vol.331. Vengeance Trance Sensation Vol.132. Vengeance Trance Sensation Vol.233. Vengeance Trance Sensation Vol.334. Vengeance Ultimate Bass EXS Halion.iso35. Vengeance Ultimate Fills Vol.136. Vengeance Ultimate Fills Vol.237. Vengeance Vocal Essentials Vol.138. Vengeance Vocal Essentials Vol.2
    1 point
×
×
  • Create New...