BlockTronex
Home
BlockTronex Developers
BlockTronex Consulting
Merchandise
Aerial video photography
D-1.9. CANADA
   BlockTronex
Home
BlockTronex Developers
BlockTronex Consulting
Merchandise
Aerial video photography
D-1.9. CANADA
More
  • Home
  • BlockTronex Developers
  • BlockTronex Consulting
  • Merchandise
  • Aerial video photography
  • D-1.9. CANADA
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • BlockTronex Developers
  • BlockTronex Consulting
  • Merchandise
  • Aerial video photography
  • D-1.9. CANADA

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

We can take any drones, hack into them and control them - Samy Kamkar, hacker

 Samy Kamkar, privacy and security researcher, computer hacker, whistleblower and entrepreneur hacked a drone live at the 'Insurance in the age of drones' conference at the Swiss Re Centre for Global Dialogue. The event brought drone experts, drone racers, regulators, lawyers, and a hacker together with Swiss Re clients, to examine how drone technology will impact casualty and aviation insurance in the near and long term. Find out more about the event here: cgd.swissre.com/events/Insurance_in_the_age_of_drones.html 

All The Ways To Hack Your Phone: Phreaked Out (Episode 3)

 Subscribe to MOTHERBOARD: http://www.youtube.com/user/Motherboa...​ Over the course of our "Phreaked Out" series, we've seen how devices such as urban control systems, moving vehicles, and smartphones are not impervious to hacks when connected to a network—cellular or wi-fi. In our third and final episode,we check out a slate of real-time phone hacks to tackle the question of mobile phone security.  Unlocking L.A.'s Traffic Grid: Phreaked Out (Episode 1): http://bit.ly/1r03DpC​How to Hack a Car: Phreaked Out (Episode 2): http://bit.ly/1ps2BB7​All The Ways To Hack Your Phone: Phreaked Out (Episode 3): http://bit.ly/1mfBwef​ Follow MOTHERBOARD Facebook: http://www.facebook.com/motherboardtv​Twitter: http://twitter.com/motherboard 

I Hacked Into My Own Car

 The first 100 people to go to https://blinkist.com/stevemould​ will get unlimited access for 1 week to try it out. You'll also get 25% off if you want full membership.  Gaining unauthorised entry to someone else's car is illegal. Jamming is illegal in the UK. It might be illegal where you live too.  Car key fobs transmit a binary code to the car over radio. If the car recognises the code it unlocks. There are various systems in place to make that process secure. This video is about the way vulnerabilities in those systems can be exploited. Including replay and rolljam attacks.  "but most of all, Samy is my hero"  You can buy my books here: https://stevemould.com/books​ You can support me on Patreon here: https://www.patreon.com/stevemould​ just like these amazing people:  Nathan Williams Matthew Cocke Glenn Watson Mark Brouwer Joseph Rocca Joël van der Loo Doug Peterson Yuh Saito Rashid Al M Paul Warelis Will Ackerly Marcel K  Twitter: http://twitter.com/moulds​Instagram: https://www.instagram.com/stevemoulds...​Facebook: https://www.facebook.com/stevemouldsc...​Buy nerdy maths things: http://mathsgear.co.uk 

Hacking a Smartphone by simply sending an SMS?

 This video shows how easy it is for a hacker to hack your android phone / iOS phone by sending an SMS!  Watch an in-depth and practical tutorial on how to do this, on my website : https://techraj156.com/videos​ DISCLAIMER : This video is only intended to bring awareness in people about how easy it is for someone to hack into your smartphone. The App used in this video is only for Demonstration purpose. This can happen with any app, and not only the one shown in the video.  SUBSCRIBE for more awesome videos!  Visit my website : https://techraj156.com​  Like my Facebook Page : https://fb.com/techraj156​  Follow me on Instagram : https://instagram.com/teja.techraj​  Follow on Twitter : https://twitter.com/techraj156​  For written tutorials, visit my blog : http://blog.techraj156.com​ SUBSCRIBE for more videos! If you like this video, don’t forget to leave a thumbs up below.  Thanks for watching!  Cheers! 

USBdriveby - exploiting USB in style

 USBdriveby (http://samy.pl/usbdriveby​) is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on any unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing things, flailing the mouse pointer around and weaponizing mouse clicks.  A version for Windows and OS X is available on github.  It also evades several security measures in OS X, including hacking the accessibility settings, window positioning, overriding network settings, and disabling portions of the Little Snitch firewall.  By Samy Kamkar  Want to attack *locked* or password protected computers? Then check out PoisonTap: https://youtu.be/Aatp5gCskvk​ Subscribe to my channel for more Applied Hacking videos: https://www.youtube.com/subscription_...​Follow me on Twitter: https://twitter.com/samykamkar​ More USBdriveby details: http://samy.pl/usbdriveby​Also check out BadUSB: https://srlabs.de/badusb/​ Music by Epoch Rises: http://soundcloud.com/epochrises​aka USB Driveby / USB Drive By  WINDOWS VERSION A Windows version is available on the Github linked from https://samy.pl/usbdriveby/​ Another user posted an alternate version for Windows: https://youtu.be/FfRhKzbgmeU​ FOR LINUX: You can simply open a terminal, add a new directory to the beginning of $PATH, install a malicious "sudo" in that user-owned path that siphons credentials and performs the same attacks and more (and still send the sudo password to the real sudo to prevent the user from noticing.)  DETECTING OPERATING SYSTEM: You can detect OS by the unique way each OS communicates with the USB device.  WHY NOT RUBBER DUCKY? Rubber Ducky is an awesome tool but lacks the HID mouse emulation required to pull off the mouse-based DNS attack we perform here! Additionally, this is half the price!

Notice

Age-restricted video (based on Community Guidelines) 

How to Detect Keylogger on your Computer? RAT Removal Guide

 In this video, you will know how to find keylogger on your computer. You will also know how to remove keyloggers. Do you want to know if someone is tracking your keystrokes? Hackers and cybercriminals could use Remote Access Trojan – RAT or keylogger to track your activity and steal confidential information like passwords and credit card information. Keep watching the whole video to know how to detect spyware without any external tool.  Download MalwareFox - https://www.malwarefox.com/​ Keylogger or spyware hides in the user’s computer and tracks the keystrokes then report it to their makers.  In order to send your confidential data, the keylogger, spyware, or RAT has to use the internet.  So if we get the list of application that is using the internet, we could identify the keylogger. So in this video, we will be using netstat command to catch keyloggers.   netstat stands for network statistics. It is a collection of tools that helps us to know the different network protocols, local & foreign IP address, port number, service, and network status.   Don't forget to like the video and subscribe to our channel for more such informative videos. 

BlockTronex

Proprietary black hat controls

BlockTronex Proprietary black hat control center.

Ethical hacking war room.

Start learning

Documentary's & short films on hacking for educational use

Intended for educational purposes

Click on picture to access 

Back a page

Copyright © 2021 BlockTronex - All Rights Reserved.

BlockTronex Network

This site uses

Analytics 

Accept