Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    INTERNET    |    The global pornography network    |    2,155 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,001 of 2,155    |
|    August Abolins to All    |
|    attacks.. what happened?    |
|    28 Mar 22 16:37:00    |
      MSGID: 2:221/1.58@fidonet fadf21e2       PID: OpenXP/5.0.51 (Win32)       CHRS: CP437 2       TZUTC: -0400       An oldie.. but may still be worth comparing it to 2022.               "The top hacking techniques of 2015 and how they work        "Posted by Jamie Boote on Monday, December 14, 2015              [1] Reflected file download (RFD)              Let's say that one morning you wake up and try to print some       last minute work notes out on your home printer. Without luck,       you decide to re-install the print driver. While browsing the       Internet, looking for a driver, you find that someone has       linked to a file on a forum that may suit your needs. As a good       internet user, you check where the link really leads and find       that it does point to a legitimate site. You click and run the       file; however, your computer is compromised and an attacker       gets in. What happened?              [2] Autonomous carjacking              After getting tricked into downloading a file you shouldn't       have, you're already late for work. During your drive, without       warning, the AC turns up to full blast, the radio begins       playing, and the transmission stops transmitting power. Your       car just got hacked.              This is the new reality of ever-smarter cars. As cars stop       resembling the mechanical carriages of years past and start       looking more and more like fly-by-wire fighter aircraft, more       and more systems are controlled by computers. With cars acting       as mobile hotspots, the barrier to unauthorized entry is       lowered dramatically. What happened?              [3] The POODLE attack              After somehow regaining control of your car, you drive into the       nearest coffee spot and reflect on how it was once illegal to       send encryption technology outside US borders. While there, you       find that your prepaid coffee card doesn't have enough funds.       As you sip your grande caff‚ mocha macchiato half soy quarter       skim quarter 2% extra grande double vanilla pump no-whip       coffeestrocity, you open your smart phone to top-off your       prepaid card. You check that the site is HTTPS enabled and the       connection is encrypted before you enter your username and       password. Now that you've got your caffeine fix, you're ready       to go about your day.              Later on, you decide to double check your coffee card balance       just to make sure the transaction went through and find that       you have not only topped off your own card, but five or six       others. What happened?                     [4] After being exploited three times in one day..              ..you decide you have had enough and you shut down your       computer, unplug your modem, remove the battery from your cell       phone, disconnect your fridge from Twitter, delete your cat's       Facebook account, trade your smart watch for a dumb one, wrap       your house in tinfoil, and turn on your old tube TV. On the       news, the anchor is talking about recent hacks that have       compromised your health insurance company, your cell company,       government agencies, and a particular scandalous website that       you never heard of until it was breached. What happened?              COMPLETE article:               https://www.synopsys.com/blogs/software-security/top-hacking-        techniques-of-2015/               https://bbs.lc/BFjFQ                            --        ../|ug              --- OpenXP 5.0.51        * Origin: A turtle that surfs the dark web. [o] A TORtoise (2:221/1.58)       SEEN-BY: 1/123 15/0 90/1 103/705 105/81 106/201 120/340 123/131 124/5016       SEEN-BY: 129/305 330 331 153/757 7715 154/10 203/0 218/700 221/1 6       SEEN-BY: 221/360 226/30 227/114 229/110 206 317 400 424 426 428 452       SEEN-BY: 229/550 664 700 240/5832 266/512 280/464 5003 282/1038 292/854       SEEN-BY: 292/8125 301/1 310/31 317/3 320/219 322/757 341/234 342/200       SEEN-BY: 396/45 423/81 120 460/58 633/280 712/620 848 770/1 2452/250       PATH: 221/1 280/464 712/848 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca