home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   INTERNET      The global pornography network      2,155 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 2,001 of 2,155   
   August Abolins to All   
   attacks.. what happened?   
   28 Mar 22 16:37:00   
   
   MSGID: 2:221/1.58@fidonet fadf21e2   
   PID: OpenXP/5.0.51 (Win32)   
   CHRS: CP437 2   
   TZUTC: -0400   
   An oldie.. but may still be worth comparing it to 2022.   
      
    "The top hacking techniques of 2015 and how they work   
    "Posted by Jamie Boote on Monday, December 14, 2015   
      
   [1] Reflected file download (RFD)   
      
   Let's say that one morning you wake up and try to print some   
   last minute work notes out on your home printer. Without luck,   
   you decide to re-install the print driver. While browsing the   
   Internet, looking for a driver, you find that someone has   
   linked to a file on a forum that may suit your needs. As a good   
   internet user, you check where the link really leads and find   
   that it does point to a legitimate site. You click and run the   
   file; however, your computer is compromised and an attacker   
   gets in. What happened?   
      
   [2] Autonomous carjacking   
      
   After getting tricked into downloading a file you shouldn't   
   have, you're already late for work. During your drive, without   
   warning, the AC turns up to full blast, the radio begins   
   playing, and the transmission stops transmitting power. Your   
   car just got hacked.   
      
   This is the new reality of ever-smarter cars. As cars stop   
   resembling the mechanical carriages of years past and start   
   looking more and more like fly-by-wire fighter aircraft, more   
   and more systems are controlled by computers. With cars acting   
   as mobile hotspots, the barrier to unauthorized entry is   
   lowered dramatically. What happened?   
      
   [3] The POODLE attack   
      
   After somehow regaining control of your car, you drive into the   
   nearest coffee spot and reflect on how it was once illegal to   
   send encryption technology outside US borders. While there, you   
   find that your prepaid coffee card doesn't have enough funds.   
   As you sip your grande caff‚ mocha macchiato half soy quarter   
   skim quarter 2% extra grande double vanilla pump no-whip   
   coffeestrocity, you open your smart phone to top-off your   
   prepaid card. You check that the site is HTTPS enabled and the   
   connection is encrypted before you enter your username and   
   password. Now that you've got your caffeine fix, you're ready   
   to go about your day.   
      
   Later on, you decide to double check your coffee card balance   
   just to make sure the transaction went through and find that   
   you have not only topped off your own card, but five or six   
   others. What happened?   
      
      
   [4] After being exploited three times in one day..   
      
   ..you decide you have had enough and you shut down your   
   computer, unplug your modem, remove the battery from your cell   
   phone, disconnect your fridge from Twitter, delete your cat's   
   Facebook account, trade your smart watch for a dumb one, wrap   
   your house in tinfoil, and turn on your old tube TV. On the   
   news, the anchor is talking about recent hacks that have   
   compromised your health insurance company, your cell company,   
   government agencies, and a particular scandalous website that   
   you never heard of until it was breached.  What happened?   
      
   COMPLETE article:   
      
    https://www.synopsys.com/blogs/software-security/top-hacking-    
   techniques-of-2015/   
      
    https://bbs.lc/BFjFQ   
      
      
      
   --   
     ../|ug   
      
   --- OpenXP 5.0.51   
    * Origin: A turtle that surfs the dark web. [o] A TORtoise (2:221/1.58)   
   SEEN-BY: 1/123 15/0 90/1 103/705 105/81 106/201 120/340 123/131 124/5016   
   SEEN-BY: 129/305 330 331 153/757 7715 154/10 203/0 218/700 221/1 6   
   SEEN-BY: 221/360 226/30 227/114 229/110 206 317 400 424 426 428 452   
   SEEN-BY: 229/550 664 700 240/5832 266/512 280/464 5003 282/1038 292/854   
   SEEN-BY: 292/8125 301/1 310/31 317/3 320/219 322/757 341/234 342/200   
   SEEN-BY: 396/45 423/81 120 460/58 633/280 712/620 848 770/1 2452/250   
   PATH: 221/1 280/464 712/848 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca