After burglaries, mystery car unlocking device has police stumped It's February, about an hour after midnight, and three men in oversized clothing and hats walk silently down a deserted residential street in Long Beach, California. Each one goes up to a car in the area, takes out a small electronic device, and pulls on the passenger side car handle. The first man tries a car in the street. It doesn't open, and he walks on. The other two men try an Acura SUV and an Acura sedan in one home's driveway. Both of the cars unlock, their overhead lamps going on. After burglaries, mystery car unlocking device has police stumped
Create and print secure tickets with barcodes or qr codes Create and print secure tickets with barcodes or qr codes Printing secure tickets or badges, which cannot be forged or copied, has never been easier and cheaper! Just use the TicketCreator Barcode edition to create and print tickets with a unique barcode on each ticket. TicketCreator prints on each ticket a unique 10-digit number as a barcode, which is checked at the entrance with the BarcodeChecker software and a simple barcode scanner (USB or PS/2, starting at € 50,-/ $ 60,-/ £ 45,-), a webcam or an Android phone. Each barcode can only be used once to enter.
Long Range WiFi Antennas USB Adapters Coaxial Cables and WiFi Tutorials
Long Range WiFi Antennas USB Adapters Coaxial Cables and WiFi Tutorials
▶ DEF CON 21 Presentation By ZOZ - Hacking Driverles
This video is currently unavailable. Sorry, this video is not available on this device. by $author Share this playlist Cancel Play ▶ DEFCON 20: Bypassing Endpoint Security for $20 or Less ▶ DEFCON 20: Bypassing Endpoint Security for $20 or Less
This video is currently unavailable. Sorry, this video is not available on this device. by $author Share this playlist Cancel Play ▶ Katy Levinson, Don't Fix It In Software, Defcon 19 ▶ Katy Levinson, Don't Fix It In Software, Defcon 19
▶ DEFCON 20: The Art Of The Con ▶ DEFCON 20: The Art Of The Con Dieses Video ist derzeit nicht verfügbar. Das Video ist auf diesem Gerät nicht verfügbar. von $author Diese Playlist teilen Abbrechen
This video is currently unavailable. Sorry, this video is not available on this device. by $author Share this playlist Cancel Play ▶ Defcon 18 - Programmable HID USB keystroke Dongle - Adrian Crenshaw - Part.mov ▶ Defcon 18 - Programmable HID USB keystroke Dongle - Adrian Crenshaw - Part.mov
Tomorrow at the Black Hat security conference in Las Vegas, the Pwnie Express will officially unleash Pwn Plug R2, the next generation in its arsenal of penetration testing and hacking hardware. Ars got an exclusive rundown in advance on the device from Dave Porcello, founder and CEO of Pwnie Express. The new Pwn Plug looks less like a DC power supply plug—the form factor of its predecessor—and more like a small Wi-Fi access point or router. Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box
Power strip or network hacking tool? It’s both, actually Pwnie Express drew a lot of attention earlier this year with its Pwn Plug, a stealthy, small computer loaded with network hacking tools disguised in an innocuous, white power brick that resembles an air freshener—albeit one with Ethernet and USB ports. Now, with funding from the Defense Advanced Research Projects Agency’s Cyber Fast Track program, the company has created an even stealthier tool for testing and cracking networks: one disguised as a power strip. The Power Pwn, now available for preorder, looks and works like a surge-protecting power strip, with eight functional 120 volt outlets. But it is also a Linux-based computer loaded with hacking software, including high-gain WiFi and Bluetooth antennas as well as dual Ethernet ports. There's also an external 3G/GSM adapter that allows it to use cellular wireless networks. Power strip or network hacking tool? It’s both, actually
Professor fools $80M superyacht’s GPS receiver on the high seas One of the world’s foremost academic experts in GPS spoofing—University of Texas assistant professor Todd Humphreys—released a short video on Monday showing how he and his students deceived the GPS equipment aboard an expensive superyacht. Humphreys conducted the test in the Ionian Sea in late June 2013 and early July 2013 with the full consent of the “White Rose of Drachs” yacht captain. His work shows just how vulnerable and relatively easy it is to send out a false GPS signal and trick the on-board receiver into believing it. “What we did was out in the open. It was against a live vehicle, a vessel—an $80 million superyacht, controlling it with a $2,000 box,” he told Ars. “This is unprecedented. Professor fools $80M superyacht’s GPS receiver on the high seas
Trusting iPhones plugged into bogus chargers get a dose of malware Plugging your phone into a charger should be pretty safe to do. It should fill your phone with electricity, not malware. But researchers from Georgia Institute of Technology have produced fake chargers they've named Mactans that do more than just charge your phone: they install custom, malicious applications onto iPhones. Their bogus chargers—which do, incidentally, charge the phone—contain small computers instead of mere transformers. Trusting iPhones plugged into bogus chargers get a dose of malware
Tomorrow at the Black Hat security conference in Las Vegas, the Pwnie Express will officially unleash Pwn Plug R2, the next generation in its arsenal of penetration testing and hacking hardware. Ars got an exclusive rundown in advance on the device from Dave Porcello, founder and CEO of Pwnie Express. The new Pwn Plug looks less like a DC power supply plug—the form factor of its predecessor—and more like a small Wi-Fi access point or router. Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box

Teensy USB Development Board

The Teensy is a complete USB-based microcontroller development system, in a very small footprint, capable of implementing many types of projects. All programming is done via the USB port. No special programmer is needed, only a standard "Mini-B" USB cable and a PC or Macintosh with a USB port. Update: Discussion / Support Forum
This video is currently unavailable. Sorry, this video is not available on this device. by $author Share this playlist Cancel Play ▶ DEFCON 19: Hacking Victims Over Power Lines

Teensy USB Development Board

The Teensy is a complete USB-based microcontroller development system, in a very small footprint, capable of implementing many types of projects. All programming is done via the USB port. No special programmer is needed, only a standard "Mini-B" USB cable and a PC or Macintosh with a USB port. Update: Discussion / Support Forum Teensy 3.1 changes from Teensy 3.0
This video is currently unavailable. Sorry, this video is not available on this device. Video player is too small. Watch Later as __user_name__ as __user_name__ ▶ DEFCON 20: Hacker + Airplanes = No Good Can Come Of This
▶ BONUS- BLACK HAT- Barnaby Jack - Jackpotting Automated Teller Machines Redux - Video
IRL Keys

GSM

PWNPI.NET | The Pen Test Drop Box Distro for the Raspberry Pi
Pentesting Appliance – Pwnie Express
Pwn Pad – Pwnie Express
Pwn Plug Elite – Pwnie Express
RFID

FareBot – Lire les cartes de transports NFC avec Android
Le NFC permet de prendre le train gratuitement
Recharger son passe Navigo de chez soi !
Des capteurs de mouvement et température sans fil
Hacker Opens High Security Handcuffs With 3D-Printed And Laser-Cut Keys
Comment voler une BMW en moins de 3 minutes
Le piratage de drones américains relance les débats
Commercial Drones and GPS Spoofers a Bad Mix
Les imprimantes 3D : un véritable problème pour les constructeurs de menottes
Des hackers volent une BMW sans clé en 180 secondes
Une porte dérobée dans le matériel militaire
Des tags NFC programmables pour Samsung
How To Win Over Your Boss
How to Turn Your Webcam Into a Streaming, Motion-Detecting Surveillance System
L’écran spécial vie privée
At Turntable.fm, SMS texts, not keys, open doors. - Shareables
Cammster Uses Your Browser and Webcam For Motion-Sensitive Home Security
Hacking from the sky with the W.A.S.P - Part 1
The Rabbit-Hole | DIY UAVs for Cyber Warfare – Wireless Aerial Surveillance Platform
Une caméra thermique pour dérober un code secret
Livebox 2 Unlocker
How to hack a vending machine - a Sports et Extrême video
This Cheap Air Drone Can Break Into Your Computer and Own It
Man In The Middle Attack - Ethical Hacking Example
Q&A: New Fraud and Identity Theft Rules
A Crimping Tool For Making Your Own Speaker Wire
OpenPCR – Du biohacking open source