Intel CPU Processor within a Processor – NSA requested
Intel ME ( management engine ) is a coprocessor integrated in all post-2006 Intel boards
Intel ME ( management engine ) is a coprocessor integrated in all post-2006 Intel boards
The TP Link TL-WR703N is very hackable and small sized.
Research Links
Making notes here regarding Kali NetHunter installed on a Nexus 7 tablet. I noticed this was possible when looking on ebay for a Nexus 7 for a car computer installation.
Research Links
YouTube: How To Install Kali On Nexus 7 [2016] High Quality
Was notified by a friend in the USA that their company is under ransom ware attack and the miscreants are asking 300 USD equivalent in BitCoins to free each device. They mentioned Petya. With all this being so wide spread I did a cursory check to see what is going on. It is notable to me that I keep hearing about hospitals being affected. Perhaps some of those cheap Indian I.T. workers that hospitals are using are moonlighting?
Research Links
News
In windows 7 there are no hooks in Control Panel to turn smb1 on and off. They suggest editing the following registry key. To enable or disable SMBv1 on the SMB server, configure the following registry key: When I attempted this there was no entry for SMB1. I created it and set it equal to zero. Not sure if that will help me.
Registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters
Registry entry: SMB1
REG_DWORD: 0 = Disabled
REG_DWORD: 1 = Enabled
Default: 1 = Enabled
This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net
This talk will demonstrate how many consumer routers can be exploited via DNS rebinding to gain interactive access to the router's internal-facing administrative interface. Unlike other DNS rebinding techniques, this attack does not require prior knowledge of the target router or the router's configuration settings such as make, model, internal IP address, host name, etc, and does not rely on any anti-DNS pinning techniques, thus circumventing existing DNS rebinding protections.
A tool release will accompany the presentation that completely automates the described attack and allows an external attacker to browse the Web-based interface of a victim's router in real time, just as if the attacker were sitting on the victim's LAN. This can be used to exploit vulnerabilities in the router, or to simply log in with the router's default credentials. A live demonstration will show how to pop a remote root shell on Verizon FIOS routers (ActionTec MI424-WR).
Confirmed affected routers include models manufactured by Linksys, Belkin, ActionTec, Thompson, Asus and Dell, as well as those running third-party firmware such as OpenWRT, DD-WRT and PFSense.
All Videos Are Listed At :- http://archive.org/details/blackhat20…
Research Links