-
Content Count
50 -
Donations
$0.00 -
Joined
-
Last visited
-
Days Won
9
Cyb3r3vil last won the day on July 13 2023
Cyb3r3vil had the most liked content!
Community Reputation
58 ExcellentAbout Cyb3r3vil
-
Rank
Newbie
- Birthday 11/09/1980
Profile Information
-
Gender
Male
-
Location
in your imagination
-
Interests
cyberphoenix
Wardiving
White Hat !
-
Cyb3r3vil started following The Last Wicked
-
The Last Wicked started following Cyb3r3vil
-
Bitdefender Adware Removal Tool for PC (DDL = Direct download link)
Cyb3r3vil replied to ShAmmY1989's topic in Link Heaven
Thankz 4 This Bro ! -
fun to play with Thankz ShAmmY1989
-
uno_lopez@ø364k started following Cyb3r3vil
-
Cyb3r3vil started following uno_lopez@ø364k
-
song facts (ever wanted to know what your fav song was about ?)
Cyb3r3vil posted a topic in Link Heaven
http://www.songfacts.com This is what i was wondering about and how i found this cool site CP Moderator Message: Mr Grumpy - Coded links -
Microsoft's Windows 10 is free for pirates? The bait-and-switch
Cyb3r3vil posted a topic in Tech News
- 1 reply
-
- 1
-
Cyb3r3vil cyber- 1. a combining form meaning “computer,” “computer network,” or “virtual reality,” used in the formation of compound words ( cybertalk; cyberart; cyberspace) and by extension meaning “very modern” ( cyberfashion). evil adjective 1. morally wrong or bad; immoral; wicked: evil deeds; an evil life. 2. harmful; injurious: evil laws. 3. characterized or accompanied by misfortune or suffering; unfortunate; disastrous: to be fallen on evil days. 4. due to actual or imputed bad conduct or character: an evil reputation. 5. marked by anger, irritability, irascibility, etc.: He is known for his evil disposition. noun 6. that which is evil; evil quality, intention, or conduct: to choose the lesser of two evils. 7. the force in nature that governs and gives rise to wickedness and sin. 8. the wicked or immoral part of someone or something: The evil in his nature has destroyed the good. 9. harm; mischief; misfortune: to wish one evil. 10. anything causing injury or harm: Tobacco is considered by some to be an evil. 11. a harmful aspect, effect, or consequence: the evils of alcohol. 12. a disease, as king's evil. adverb 13. in an evil manner; badly; ill: It went evil with him. Idioms 14. the evil one, the devil; Satan. before 900; Middle English evel, evil, Old English yfel; cognate with Gothic ubils, Old High German ubil, German übel, Old Frisian, Middle Dutch evel evil Every mortal must learn that there is neither power nor reality in evil. It is society that interferes with tom, and not personified evil. Peck came to the conclusion that possession was a rare phenomenon related to evil. evil adj. Old English yfel (Kentish evel) "bad, vicious, ill, wicked," from Proto-Germanic *ubilaz (cf. Old Saxon ubil, Old Frisian and Middle Dutch evel, Dutch euvel, Old High German ubil, German übel, Gothic ubils), from PIE *upelo-, from root *wap- (cf. Hittite huwapp- "evil"). "In OE., as in all the other early Teut. langs., exc. Scandinavian, this word is the most comprehensive adjectival expression of disapproval, dislike or disparagement" [OED]. Evil was the word the Anglo-Saxons used where we would use bad, cruel, unskillful, defective (adj.), or harm, crime, misfortune, disease (n.). The meaning "extreme moral wickedness" was in Old English, but did not become the main sense until 18c. Related: Evilly. Evil eye (Latin oculus malus) was Old English eage yfel. Evilchild is attested as an English surname from 13c. U.S.A The Axis of Cyber Evil: A North Korean Case of Cyber EspionageOctober 10, 2013 By: MacDonnell Ulsch
-
More than 400 Underground Sites seized by FBI in 'Operation Onymous'
Cyb3r3vil posted a topic in World News
-
Section 66A of IT Act is Unconstitutional, Supreme Court Rules
Cyb3r3vil posted a topic in World News
-
This new technique would allow hackers to stealthily siphon passwords or security keys from a secured system and send the sensitive data to an Internet-connected system which is placed in close proximity controlled by hackers. Hackers could also use their Internet-connected system to send malicious commands to the air-gapped computer using the same heat and sensor technique in order to cause more severe danger to the secured infrastructure. The team provided a video demonstration which shows how they were able to send a command from one computer to an adjacent air-gapped machine to re-position a toy missile launcher connected to the adjacent air-gapped system. HOW BITWHISPER WORKS ? Thermal sensors exist in computers used to trigger the internal fans to cool the PC down if overheating components such as CPU, GPU (graphics-processing unit) and other motherboard components threatens to damage them. BitWhisper utilizes these sensors to send commands to an air-gapped system or siphon data from it. The different heat patterns generated from the computer is regulated and binary data is modulated into thermal signals. The other adjacent PC in close proximity to the first one uses its built-in thermal sensors to measure the environmental changes. These changes are then sampled, processed, and demodulated into binary data in order to exfiltrate data. Experts demonstrated that the communication can also be bi-directional with both computers capable of transmitting or receiving commands and data by using the heat emitted by computers’ various components. A hacker simply needs to plant a piece of malware on each PC that need to communicate. The malware is designed to search for nearby systems by periodically emitting a thermal ping from the infected system in order to determine when a victim has placed his infected laptop next to a classified desktop system. "Once a bridging attempt is successful, a logical link between the public network and the internal network in established," researchers explained. "At this stage, the attacker can communicate with the formerly isolated network, issuing commands and receiving responses." Both the systems would then engage in a handshake, involving a sequence of "thermal pings", to establish a connection between them. But increased success of an operation is achieved outside work hours, when the internet-connected computer and the air-gapped one are in close proximity for an ongoing period and there is no need to conduct a handshake each time. FEW LIMITATIONS The proof-of-concept attack requires both systems to first be compromised with malware. The attack currently allows for just 8 bits of data to be reliably transmitted over an hour, which is sufficient for an attacker to siphon a password or secret keys. The attack works only if the air-gapped system is within 40 centimeters/about 15 inches from the other computer controlled by an attacker. However, researchers say they may be able to increase the distance between the two communicating computers and the speed of data transfer between them. FUTURE ATTACK MAY INVOLVE IoT DEVICES According to the security researchers, the future research might involve using the so-called internet of things (IoT) — an internet-connected heating and air conditioning system or a fax machine — as an attack vector instead of internet-connect computers. The team of researchers Mordechai Guri and Matan Munitz, under the guidance of Professor Yuval Elovici, planned to present their findings at a security conference in Tel Aviv next week and publish a paper on their research, "BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations." HOW BITWHISPER WORKS ? Thermal sensors exist in computers used to trigger the internal fans to cool the PC down if overheating components such as CPU, GPU (graphics-processing unit) and other motherboard components threatens to damage them. BitWhisper utilizes these sensors to send commands to an air-gapped system or siphon data from it. The different heat patterns generated from the computer is regulated and binary data is modulated into thermal signals. The other adjacent PC in close proximity to the first one uses its built-in thermal sensors to measure the environmental changes. These changes are then sampled, processed, and demodulated into binary data in order to exfiltrate data. Experts demonstrated that the communication can also be bi-directional with both computers capable of transmitting or receiving commands and data by using the heat emitted by computers’ various components. A hacker simply needs to plant a piece of malware on each PC that need to communicate. The malware is designed to search for nearby systems by periodically emitting a thermal ping from the infected system in order to determine when a victim has placed his infected laptop next to a classified desktop system. "Once a bridging attempt is successful, a logical link between the public network and the internal network in established," researchers explained. "At this stage, the attacker can communicate with the formerly isolated network, issuing commands and receiving responses." Both the systems would then engage in a handshake, involving a sequence of "thermal pings", to establish a connection between them. But increased success of an operation is achieved outside work hours, when the internet-connected computer and the air-gapped one are in close proximity for an ongoing period and there is no need to conduct a handshake each time. FEW LIMITATIONS The proof-of-concept attack requires both systems to first be compromised with malware. The attack currently allows for just 8 bits of data to be reliably transmitted over an hour, which is sufficient for an attacker to siphon a password or secret keys. The attack works only if the air-gapped system is within 40 centimeters/about 15 inches from the other computer controlled by an attacker. However, researchers say they may be able to increase the distance between the two communicating computers and the speed of data transfer between them. FUTURE ATTACK MAY INVOLVE IoT DEVICES According to the security researchers, the future research might involve using the so-called internet of things (IoT) — an internet-connected heating and air conditioning system or a fax machine — as an attack vector instead of internet-connect computers. The team of researchers Mordechai Guri and Matan Munitz, under the guidance of Professor Yuval Elovici, planned to present their findings at a security conference in Tel Aviv next week and publish a paper on their research, "BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations."
-
Dangerous 'Vawtrak Banking Trojan' Harvesting Passwords Worldwide
Cyb3r3vil posted a topic in World News
CP Moderator Message: Mr Grumpy - Coded links -
I get to drive it next Right ? Cool ride Bro !
-
http://boombeachhacktool.com/ here is another one my friend http://www.boombeachhacktool.org/