Hacking De-ICE 100 using Hydra and John the Ripper
This tutorial demonstrates how to use hydra and john the ripper to brute force ssh and launch a dictionary attack against the password hashes found in /etc/shadow.
We use the De-ICE iso, a linux live CD based on slax, as the victim. The De-ICE iso is run in an oracle virtualbox virtual machine on a kali host.
This video is a demo of the Boblight daemon pushing 50 WS2801 pixels attached to the back of a TV. Its a totally ghetto setup I put together with masking tape to make this video. The boblight daemon is running on a Raspberry Pi running occidentalis and being fed its instructions from the boblight plugin for XBMC. XBMC is on a fully separate Windows Desktop that is driving the video. The boblight plugin for XBMC communications with the Raspberry pi via a UDP stream. It analyzes the edges of the video in real time and streams the data to the Raspberry Pi that drives the LEDs.
For the full effect, focus on the wall behind the TV to see how the colors on the edge of the screen bleed over to create an ambient light in the room.
This is only the demo, full tutorial coming soon.
http://HackedExistence.com
Network Spoofer is a navite app for the Android platform that requires root access to perform a multitude of attacks against a router.
Project Page: http://hackedexistence.com/project-networkspoofer.html
An Introduction to the USB Rubber Ducky, a device from the guys over at Hak5. The Rubber Ducky is a device that looks like a thumb drive but masquarades as a keyboard and can type keystrokes on the machine it is plugged into. The USB Rubber Ducky can also be formatted to work as a USB thumb drive in addition to a keyboard. It is an interesting attack vector as there is no simple way to block this type of attack.
More information can be found on the project page here:
http://hackedexistence.com/project/rubberducky/usb-rubber-ducky-intro.html
Fing, the Android Network Scanner from overlooksoft, is a great tool for discovering devices on your network, scanning for open services, and other network recon.
A clip from the Defcon 17 Speech "Hadoop: Apache's Open Source Implementation of Google's Map Reduce Framework" given by the Hacked Existence Team.
For the complete speech and source code, check out the project page here: http://hackedexistence.com/project-hadoop.html
http://hackedexistence.com/project/rbscaptchalab/hope_11_speech.html
Hacked Existence speech at HOPE 11 in New York in 2016. This speech outlines the creation and implementation of RBSCaptchaLab, our attempt at creating an emotion based CAPTCHA.
Piik is an Android based Network Traffic Image Extractor. It works very similar to driftnet on linux.
Piik homepage: http://piik.co/
Hacked Existence Project Page: http://hackedexistence.com/project-piik.html
Piik begins its attack by performing an ARP spoof to redirect all network traffic through the android device. It then extracts and displays images on the android device in real time as they fly across the network. When you tap on an image, Piik will show the image source and the host that loaded the image.