home.social

#cracking — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cracking, aggregated by home.social.

  1. So #Denuvo was beated at the end of the day?

    There is a lot of "pirated" games that were protected with Denuvo are now playable without the protection:

    - #Wukong
    - #ResidentEvilRequiem
    - #Pragmata
    - #FC26
    - #AssassinsCreedShadows
    - #StellarBlade
    - #CrimsonDesert
    - #MonsterHunterWilds
    - An many, many more.

    I wonder what's the performance difference between Denuvo and Denuvo-less copies.

    #Videogames #Gaming #Games #Software #Piracy #Crack #Cracking #Hack #Hacking #Denuvowo #voices38 #Repack

  2. Взлом зашифрованного pdf-файла. Взлом зашифрованных архивов rar, zip, 7z. Утилиты pdfcrack, rarcrack и не только

    Всех приветствую, читатели Хабра! В сегодняшней статье я поделюсь примерами кракинга зашифрованных паролями pdf-файлов и файлов архивов. Я покажу примеры работы с такими программами как pdfcrack, rarcrack, John the Ripper. Естественно данные программы работают в линукс (в моем случае Kali Linux), но под Windows я думаю есть аналоги данных программ. И да, в этой статье я затрону примеры связанные с john, хоть возможно на Хабре и имеются статьи связанные с данной программой (а в русскоязычном сегменте интернет точно есть описания как с ней работать), но в рамках данной статьи мои примеры будут уместны и необходимы. Это своего рода онлайн-шпаргалка по использованию данных утилит Примечание Правовая информация: Данная статья создана исключительно в ознакомительных/образовательных/развивающих целях. Автор статьи не несет ответственности за ваши действия. Автор статьи ни к чему не призывает, более того напоминаю о существовании некоторых статей в уголовном кодексе РФ, их никто не отменял: УК РФ Статья 272. Неправомерный доступ к компьютерной информации УК РФ Статья 273. Создание, использование и распространение вредоносных компьютерных программ УК РФ Статья 274. Нарушение правил эксплуатации средств хранения, обработки или передачи компьютерной информации и информационно-телекоммуникационных сетей Все атаки я проводил на своем персональном компьютере, где создавал собственные файлы, которые и атаковал, то есть все действия легитимны. И как всегда просьба не переходить на личности в комментариях, если вы обнаружили ошибку недочет или неточность, просто без оскорблений напишите комментарий или напишите мне личным сообщением.

    habr.com/ru/articles/906076/

    #pdf #zip #rar #7z #cracking #wordlist #информационная_безопасность #john_the_ripper #хакинг #hacking

  3. Quick-Drying, Fast-Cracking

    Water droplets filled with nanoparticles leave behind deposits as they evaporate. Like a coffee ring, particles in the evaporating droplet tend to gather at the drop’s edge (left). As the water evaporates, the deposit grows inward (center) and cracks start to form radially. After just a couple minutes, the solid deposit covers the entire area of the original droplet and is shot through with cracks (right).

    Researchers found that the cracks’ patterns and propagation are predictable through a model that balances the local elastic energy and and the energy cost of fracture. They also found that the spacing between radial cracks depends on the deposit’s local thickness. Besides explaining the patterns seen here, these cracking models could help analyze old paintings, where cracks could hide information about the artist’s methods and the artwork’s condition. (Image and research credit: P. Lilit et al.; via Physics Today)

    #art #cracking #deposition #droplets #drying #evaporation #fluidDynamics #particleSuspension #physics #science

  4. “There is a crack in everything…”

    When millimeter-sized drops of water infused with nanoparticles dry, they leave behind complex and beautiful residues. As water continues evaporating, the residues warp, bend, and crack. In this video, researchers set their science to the music of Leonard Cohen. The results resemble blooming flowers and flying water fowl. If you’d like to learn more about the science behind the art, check out the two open-access papers linked below. (Video and image credit: P. Lilin and I. Bischofberger; submitted by Irmgard B.; see also P. Lilin and I. Bischofberger and P. Lilin et al.)

    #coffeeRings #cracking #droplets #drying #evaporation #fluidDynamics #fluidsAsArt #granularMaterial #particleSuspension #physics #science

  5. “Catching Computer Crooks”, Popular Mechanics, 1984

    The image at the top of this blog is, from what I can find, the first stock image photo of a hacker in a ski mask that ever appeared in print, carrying on a visual association between hackers and bank robbers or safe crackers that has continued since 1969.

    How tropes and stereotypes originated and became perpetuated in the media is one of the main focuses of the realhackhistory project.

    We can be almost certain of being wrong about the future, if we are wrong about the past.

    Gilbert K. Chesterton

    Illustration from “Superzapping in Computer Land”, TIME Magazine, January 12th, 1981

    Before I try to define what this website and the associated YouTube and Mastodon accounts are all about I want to discuss what they aren’t.

    This history research, documentation and analysis project is not about trying to dox hackers from the past, reveal secrets that could get people into legal peril or fuel hacking scene gossip. I’m not interested in when Java was invented or the anniversary of the first web browser being created here either though, we are talking about hackers. The ‘darkside’.

    This project is about documenting the history of people like Neal Patrick in the video below, who became the face of hacking in 1983 after being raided by the authorities, along with his hacking group the 414s.

    https://www.youtube.com/watch?v=dA3NuQdhu5U

    Behind the blogs, the YouTube videos, FOIA documents, clips of funny hacker related TV shows or movies and the memes, realhackhistory is a genuine desire to keep the knowledge and stories of hackers of the past alive and provide some lessons that can still help people interested in hacking today.

    I envision realhackhistory as a trail of breadcrumbs to help get you started on your way to understanding the past, and hopefully the present, of hacking better. Think of this as digital archaeology, if it makes it all sound cooler.

    Information on the Internet is frequently wrong

    If we start with some basic questions such as “what was the first computer virus?” or “when was the first denial of service attack?” and plug them into your search engine of choice you’ll start to notice something.

    It isn’t that there are conflicting answers, some of these questions hinge on a subjective understanding of details such as what defines a computer virus, what operating system did it function on, what language was it coded in, etc. No, you start to notice how many answers that are clearly wrong are stated emphatically as fact.

    We need an example, right? Let’s analyse this text below, from the online version of Encyclopedia Britannica:

    The first documented DoS-style attack occurred during the week of February 7, 2000, when “mafiaboy,” a 15-year-old Canadian hacker, orchestrated a series of DoS attacks against several e-commerce sites, including Amazon and eBay.

    Encyclopedia Britannica, “denial of service attack” entry

    Let’s unpack this. While it is true that mafiaboy carried out a widely reported on campaign of distributed denial of service (DDoS) attacks against high profile websites in 2000. This was not the first distributed denial of service attack and definitely not the first denial of service attack either.

    Mafiaboy, an aficionado, but not originator, of denial of service attacks

    Distributed denial of service attacks, called “Net Strikes” by participants, were organised by hacktivists in the mid 90’s against French government websites which involved getting people to manually refresh those websites at a set time. There was also a huge DDoS attack against Manhattan based ISP Panix in September of 1996.

    The first denial of service attack over a computer network is widely believed to have been in 1974, when someone discovered a way to use a newly introduced feature in TUTOR to lock up other PLATO terminals remotely at CERL, the Computer-based Education Research Laboratory, at the University of Illinois Urbana-Champaign.

    It doesn’t necessarily matter that there may have been other denial of service attacks before 1974, what matters I think is that the first denial of service attack was definitely not in 2000 and that this is incorrect information being presented as fact.

    How did this clearly wrong history sneak into an encyclopedia? I would suspect the loop of incorrect information that begins to be circulated online and eventually becomes, through copying, regurgitation and repetition, accepted fact. Nobody bothers to go back to original sources, lazy journalism becomes grist for a slew of blogs which eventually becomes part of a reference book and then accepted fact.

    Incorporating AI into search engines will only make this problem worse, if the average of all the information about the history of hacking is a bunch of copypasta in infosec marketing or lazy journalism then that is what the AI search function will regurgitate. Garbage in, garbage out.

    Tracing attitudes to hackers in pop culture

    Hackers were not always demonised, hacking was not always a part of pop culture and the word “hacker” itself was not widely used to describe anything other than a bad golfer until mid 1983. I’ve written a whole blog on the topic.

    The ‘Whiz Kids’, from the 1983 TV show of the same name about teens who solve mysteries with the aid of computers, social engineering and hacking

    We can look at how journalists wrote about hacking and hackers in the past and how hackers evolved as character archetypes and hacking became a trope in movies and television.

    We can chart the way hackers are viewed, from novelty or curiosity through to menace and then back to heroic anti-heroes before lately becoming a facet of shadowy criminal gangs, as the view of hackers as professionalised “cybercriminals” takes hold in the public imagination.

    The German poster for 1983’s WarGames, a movie about hacking in which the word “hacker” is never used

    The 90’s saw an explosion of hacker and hacking related movies as people became unable to ignore the rise of the internet and computers became a part of every day life. I made a YouTube video about one such movie, The Net.

    https://www.youtube.com/watch?v=ug3-h7nYV0Q

    Hacker related documentaries, news segments and TV specials created by non-hackers provide a fascinating snapshot of the attitudes towards hackers and how hacking touched on current events at the time the documentary was filmed. I’ve put as many as I can find from over the years up on my YouTube channel.

    Preserving & promoting hacker culture

    While a lot of people have heard of 2600 Magazine, or the phrack e-zine, there is a lot more hacker culture created by hackers themselves out there waiting to be discovered.

    Take published books about hacking written by hackers for instance, in the UK there was various editions of Hugo Cornwall’s book “The Hacker’s Handbook”, originally published in 1985. There was also infamous subversive publisher Loompanic’s book “The Computer Underground: Computer Hacking, Crashing, Pirating, and Phreaking” by M. Harry, which was also published in 1985.

    • “The Hacker’s Handbook”, original 1985 edition, by Hugo Cornwall
    • “The Computer Underground: Computer Hacking, Crashing, Pirating, and Phreaking” by M. Harry, Loompanics, 1985

    Reading these books not only give us a snapshot of the scene at the time through the author’s eyes, but also a chance to read how hackers themselves defined a hacker.

    This book uses the word in a more restricted sense: hacking is a recreational and educational sport. It consists of attempting to make unauthorised entry into computers and to explore what is there. The sport’s aims and purposes have been widely misunderstood; most hackers are not interested in perpetrating massive frauds, modifying their personal banking, taxation and employee records, or inducing one world super-power into inadvertently commencing Armageddon in the mistaken belief that another super-power is about to attack it.

    Every hacker I have ever come across has been quite clear about where the fun lies: it is in developing an understanding of a system and finally producing the skills and tools to defeat it. In the vast majority of cases, the process of ‘getting in’ is much more satisfying than what is discovered in the protected computer files.

    “The Hacker’s Handbook” – Introduction, Hugo Cornwall, 1985

    Documentaries about hackers by hackers or people affiliated with the hacking scene are a more vivid look at some of the personalities who shaped scene history, or notable events that took place. Annaliza Savage’s “Unauthorized Access” released in 1994 is required viewing, as is “Hackers 95” by Phon-E and R.F. Burns, released in 1995 (of course), you can see a short clip of below.

    https://youtu.be/7abDgYYXhks?si=8upHxOHKs8wB6jX2

    Over at textfiles.com you can find an incredible resource in the form of archived hacker scene text files, from the BBS years up to the era of the world wide web. Among the files archived is a great many hacker e-zines, or electronic magazines, text and text ASCII art documents that were published on a regular or semi-regular schedule.

    The most famous hacker e-zine is undeniably phrack magazine.

    Basically, we are a group of phile writers
    who have combined our philes and are distributing them in a group. This newsletter-type project is home-based at Metal Shop… These philes may include articles on telcom (phreaking/hacking), anarchy (guns and death & destruction) or kracking. Other topics will be allowed also to an certain extent.

    phrack issue #1, Taran King, November 17th, 1985

    Hacker media is also in print though, with magazines like the now defunct Technological American Party Magazine of the 1970s or Blacklisted! 411 back in the nineties or 2600, which is still going strong.

    2600 Magazine issue 1, page 6, January 1984

    2600 Magazine began in January of 1984 with an article discussing a criminal case that contributors to the magazine had been involved in the year before the first issue came out. It was a series of raids on young hackers across the U.S. that the FBI called “Operation Mainframe”. I created a video on one of the groups caught up in the FBI investigation, the Inner Circle.

    https://www.youtube.com/watch?v=ppbx2POxxZU

    2600 staff continued to be involved in hacking related incidents in the years after, as we can see from the article from 1985 below that notes that the editor of 2600 had his BBS seized by New Jersey police.

    “Police hunt suspects” – Altus Times, 18th July, 1985

    You can find scanned issues of publications like Blacklisted! 411 over at archive.org and you can subscribe to 2600 over at their website.

    Freedom of Information Act requests

    Locked away in dusty archives is a wealth of information on the history of hacking, specific hackers and hacking groups, held by government bodies and law enforcement agencies.

    To paraphrase NatSecGeek, if you are willing to take five minutes to write a FOIA request and then to wait potentially years for that request to be fulfilled you can eventually find yourself with documents that can rewrite our understanding of events in the history of hacking. My inspiration for pursuing FOIA requests as part of realhackhistory has been the aforementioned NatSecGeek as well as hexadecim8 and their Hacking History project.

    You can find the documents they have retrieved from various archives here, and you can find my uploads of responsive records over at archive.org.

    If requesting FOIA documents can be a bit boring and laborious, receiving them makes me feel like a little kid on Christmas morning.

    FOIA archive requests can turn up completely different versions of events that had long been considered to be definitively settled. Records can show us scans or photocopies of newspaper or magazine articles since lost to time, printouts of webpages that are no longer online and the chance to see how government agencies or law enforcement have viewed the computer underground over the years.

    In requesting documents I have primarily focused on records relating to hacking incidents between 1980 and 2005, with a particular interest in records from the early to mid 1980’s as records can degrade or get lost over time.

    Because of FOIA requests we can see that in 1983 some people were so upset about the FBI raiding high-school age hackers linked to the Inner Circle hacking group that they wrote their Senator in California.

    Or we can see the actual photocopies of notes of targeted systems seized by the FBI from those same hackers.

    The text files, e-zine and magazine articles written by hackers provide one part of the story, the newspaper articles and TV segments on hacking incidents provide another and FOIA documents are the last piece of the puzzle that we as hacker history enthusiasts can hope to get our hands on in terms of records.

    I plan future blog entries on how to file FOIA requests, how to decide what to FOIA and some dead ends I have reached in relation to past hacker events and incidents that someone else might want to pick up the threads from.

    In conclusion

    So that’s it, an explanation as to why realhackhistory exists, long since overdue and the start of a call to action for others who are interested, to see what they can add to the public knowledge of the roots of the hacking scene.

    If I can outline a roadmap for the future of the project, I want to expand my understanding of the history of hacking outside of the English speaking world, start finding countries outside of the U.S, the U.K. and Australia to FOIA and pursue freeing more media from closed archives.

    I’d also like to take this time to thank the people who have inspired me along the way, in particular Gabriella Coleman, Emma Best and Emily Crose, for encouragement and guidance on this great journey.

    If we don’t preserve our history, nobody else will.

    https://realhackhistory.org/2024/10/22/muddled-history-of-the-digital-underground-why-realhackhistory-exists/

    #1 #1980s #BBS #computer #cracker #crackers #cracking #darkSide #darkside #DDoS #encyclopedia #FBI #films #FOIA #hacked #hacker #hackers #hacking #historical #history #InnerCircle #IRC #mafiaboy #media #Movies #newspaper #police #television #TV #underground #WarGames

  6. Weird Maps Win Elections – [USA] Gerrymandering Explained [Map Men]
    --
    youtu.be/cwBslntC3xg?si=cNufts <-- shared video
    --
    [an excellent description of gerrymandering of political districts in the USA]
    “Why does the USA draw district maps with absolutely bonkers shapes? And how do squiggly districts help the wrong politicians win elections? And have we been pronouncing "Gerrymandering" wrong for 200 years?...”
    #GIS #spatial #mapping #MapMen #gischat #politics #USA #political #gerrymandering #elections #districts #packing #cracking #voting #voters #democracy #selfsorting #demographics #minorities #VotingRightsAct #diversity #redistricting #AI #swingvoters #elections #MapMen

  7. One example why to use strong #passwords for users who use file sharing over #SMB even when the file transfers are #encrypted.
    If the SMB traffic is captured/eavesdropped, then the attacker can try to crack the user password.
    The attacker is able to extract challenge/response values from the Session Setup and then use #passwordcracking tools such as #hashcat

    If the attack is successful, the attacker will gain not only the access to the user account, but it is also possible to decrypt the captured SMB file transfers. There is lack of perfect forward secrecy in this encryption.

    For more details and practical examples, see this blog post:

    malwarelab.eu/posts/tryhackme-

    #networktrafficanalysis #networktraffic #encryption #netntlmv2 #netntlm #ntlm #windows #fileshare #pentesting #cybersecurity #hardening #password #cracking #offensivesecurity #offsec #blueteam #purpleteam

  8. Splitting wearables straps and cracking PVC leather gaming chairs could be prevented by applying UV filtering sprays to stop photodegradation

    I've had Fitbit as well as an LG smartwatch strap starting to split after a year or two of use, and I just heard that a similar type of cracking happens with the synthetic PVC leather of gaming chairs, and the advice is to apply a good UV filtering spray like you get for dashboards of cars. A typical brand mentioned is 303 UV Protectant Spray which lubricates the material and filters UV. You'd probably want to apply this at least monthly but it may go a long way to making the material last a lot longer. There are similar sprays produced for tents and other outdoor furniture. But its too late to try this after the damage is done, it needs to be applied from just after to acquire the devices. squeet.me/objects/962c3e10a836