DEF CON 27 (2019) Report Version 1A (2019-08-11)

Total Page:16

File Type:pdf, Size:1020Kb

Load more

DEF CON 27 (2019) Report Version 1a (2019-08-11) POC: Steve Holden, [email protected], www.technewsradio.com, @technewsradio ​ ​ ​ ​ ​ LICENSE: Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ​ ​ These are my own personal notes taken at DEF CON 27 (held in 2019). This includes notes from talks I attended in person (marked with a *), but also my analysis as time permitted of key information from select slides posted to: https://media.defcon.org Starting in 2017, DEF CON stopped providing Presentations CD with session material. See the ​ DEF CON Media Server for a complete archive of material from the beginning of DEF CON 1. Updated notes will be periodically posted as time permits. Corrections, suggestions, comments, etc are welcome. I also have similar reports (1- total) from DEF CON 18, 19, 20, 21, 22, 23, 24, 25, & 26. These notes will include links to external sites. Most of the sites have been validated, but there could be some issues. Use your best judgement. A complete list of sessions and speakers can be found on the official HTML version of the DEF CON program: https://www.defcon.org/html/defcon-27/dc-27-schedule.html. A complete list of speakers and session abstracts are here: ​ https://www.defcon.org/html/defcon-27/dc-27-speakers.html. ​ Document organization: Sessions (organized by date/time); Workshops; Demo Labs; Vendors; Training Options; and News Coverage (all the way at the end of the document). Thursday, August 08, 2019: 101 Sessions (did not attend any of these): ● Exploiting Windows Exploit Mitigation for ROP Exploits - Omer Yair ○ https://defcon.org/html/defcon-27/dc-27-speakers.html#Yair ● Breaking Google Home: Exploit It with SQLite (Magellan) - Wenxiang Qian, YuXiang Li, HuiYu Wu ○ https://defcon.org/html/defcon-27/dc-27-speakers.html#Qian ● Are Quantum Computers Really A Threat To Cryptography? A Practical Overview Of Current State-Of-The-Art Techniques With Some Interesting Surprises - Andreas Baumhof ○ https://defcon.org/html/defcon-27/dc-27-speakers.html#Baumhof ● Intro to Embedded Hacking -- How you too can find a decade old bug in widely deployed devices. [REDACTED] Deskphones, a case study. - Philippe Laulheret ○ https://defcon.org/html/defcon-27/dc-27-speakers.html#Laulheret ○ Slides and demo video are on the Media Server ● Web2Own: Attacking Desktop Apps From Web Security’s Perspective - Junyu Zhou, Ce Qin, Jianing Wang ● DEF CON 101 Panel - Highwiz, Nikita, Will, n00bz, Shaggy, SecBarbie, Tottenkoph Friday, August 9, 2019: Behind the Scenes of the DEF CON 27 Badge - Joe Grand (Kingpin) ● Slides are on the Media Server: ○ https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON -27-Joe-Grand-Badge.pdf ○ https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON -27-Joe-Grand-The-DEFCON-27-Badge.pdf ● Link to speaker: https://defcon.org/html/defcon-27/dc-27-speakers.html#Grand ​ Hacking Congress: The Enemy Of My Enemy Is My Friend - Former Rep. Jane Harman, Rep. James Langevin, Jen Ellis, Cris Thomas, Rep. Ted Lieu ● Link to speakers https://defcon.org/html/defcon-27/dc-27-speakers.html#Harman ​ ● No slides on the Media Server Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware - Olivier Bilodeau, Masarah Paquet-Clouston ● Link to the speakers https://defcon.org/html/defcon-27/dc-27-speakers.html#Bilodeau ​ ● Slides are on the Media Server https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Ma sarah-Paquet-Clouston-Olivier-Bilodeau-The-Industry-of-Social-Media-Manipulation-Driven-by-Malware .pdf *Duplicating Restricted Mechanical Keys - Bill Graydon, Robert Graydon ● More info on the presenters: https://defcon.org/html/defcon-27/dc-27-speakers.html#Graydon ​ ● Good overview of how keys work and how they are traditionally copied and originally created ● “Restricted Key” - have additional “keyways” sometimes horizontal (and most key copy places don’t have the machines to cut these) ● Interesting review of SCHLAGE logs and how they make 5 pin and 6 pin (including details on master keys) ● Review of 3D printing options ● They have built a scripting language and a database for capturing keyways and then making new keys using 3D printing ● Review of USPS keys and how they were “copied” in LA by thieves ● Stolen locks can be reverse engineered to build keys that can be used on locks using the same “keyways” (including determining the master key) ● Reviewed of current vendors of locks (Master, Medeco) ● Some keyways can be purchased just for a specific facility (examination of just taking a photo of the lock and then reverse engineering the key) ● Deep dive in Medeco family of keys/locks (most Hacker spaces have the machines necessary to copy these keys. ● Some keys have two parts -- MUL-T-LOCK ● Review of a tool they bought on eBay for $100 ● Getting some of these keys made is by presenting a “card” from the manufacturer. These can be forged very easy. ● Videos https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bill -Graydon-Demo-Videos/ ● Slides https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Bill -Graydon-Restricted-Keys.pdf *Don’t Red-Team AI Like a Chump - Ariel Herbert-Voss ● More info about the speaker: https://defcon.org/html/defcon-27/dc-27-speakers.html#Herbert-Voss ​ ● Slides are on the Media Server ● Review of how to make AI tactics (Tesla) ● Review of AI systems (data comes into a black box (model) and the output is a prediction ● Model = recognize pixels to determine if there is a boat in an image ● What can be “broken” - Data (poison - supply chain attack), Model (need to know the type) ● Can you spoof the prediction? (confidence levels) ● Deep dive on how to fool an AI-powered video surveillance (good set of slides) ● Red Team AI means to “test” AI for vulnerabilities (Adversarial ML attacks) ● There was a recent attack on a virus detection system that compromised the “data supply chain” The Tor Censorship Arms Race: The Next Chapter - Roger Dingledine ● More details on the speaker: https://defcon.org/html/defcon-27/dc-27-speakers.html#Dingledine ​ ● Slides are on the media server All the 4G Modules Could Be Hacked - Xiao Hui Hui, Ye Zhang, Zheng Huang ● More details on the speakers: https://defcon.org/html/defcon-27/dc-27-speakers.html#XiaoHuiHui ​ ● Slides are on the media server Evil eBPF In-Depth: Practical Abuses of an In-Kernel Bytecode Runtime - Jeff Dileo ● More details on the speaker: https://defcon.org/html/defcon-27/dc-27-speakers.html#Dileo ​ ● Slides and extras are on the Media Server. Process Injection Techniques - Gotta Catch Them All - Itzik Kotler, Amit Klein ● More details on the speaker - https://www.defcon.org/html/defcon-27/dc-27-speakers.html#Kotler ​ ● Slides and extras are on the Media Server. *Phreaking Elevators - WillC ● More details on the speaker: https://www.defcon.org/html/defcon-27/dc-27-speakers.html#WillC ​ ● Slides are on the Media Server. ● Speaker is a ‘high voltage’ expert and has been going to a lot of hacking conference ● There is a HOPE talk about elevators (see) ● Elevator phones (who has used them) ● Disclaimer ● Push the button - dials a number ● They connect: POTS, VoIP, Cellphone ● Most are POTS (ADA/ASME17) ● Some phones will dial 911, maintenance elevator, OpenCNAM (elevator phone list has been posted) ● Social engineering - getting the phone number you dialing from (and then you could call them back) ● Getting to independent service (restricted floors) ● How to program an elevator: ○ Site ID 2 ○ Hangup *# or *0 0 ○ Maybe connection to a PBX or other line concentrators ○ Most locations and elevators are unique ○ An elevator could have is own PBX (if you don’t get a full phone # you are probably on a PBX) ● Some elevators also connect into an emergency concentrator like those on a wall and there are also intercom system. ● There are also Fire Fighters Phone (if you put a connector in, an alert is going to be sent) ● A lot of these elevators have manuals ● Some demos (you can do programming via key pad, switches, remote, code) ● There is a default elevator phone passwords ● www.datagenetics.com/blog/september32012/index.html ● 900 # calling is charging $2.55 a minute (if you had a number you could rack up some faud calls) ● Elevator numbers should be monitored: logging, alerting, etc. Infiltrating Corporate Intranet Like NSA _Pre-auth RCE on Leading SSL VPNs Orange - Tsai, Meh Chang ● more info about the speakers: https://defcon.org/html/defcon-27/dc-27-speakers.html#Tsai ​ ● Slides and videos are on the Media Server. API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web - Joshua Maddux ● more info about the speaker: https://defcon.org/html/defcon-27/dc-27-speakers.html#Maddux ​ ● Slides and video is on the Media Server. HackPac: Hacking Pointer Authentication in iOS User Space - Xiaolong Bai, Min (Spark) Zheng ● more info about the speaker: https://defcon.org/html/defcon-27/dc-27-speakers.html#Bai. ​ ​ ● Slides are not on the Media Server (as of 8/9/2019) HVACking: Understand the Difference Between Security and Reality! - Douglas McKee, Mark Bereza ● more info about the speakers: https://defcon.org/html/defcon-27/dc-27-speakers.html#McKee ​ ● Slides are on the media server *No Mas—How One Side-Channel Flaw Opens Atm, Pharmacies and Government Secrets Up to Attack - phar ● more info about the speakers: https://defcon.org/html/defcon-27/dc-27-speakers.html#phar ​ ● Review of latest in electronic lock design and overview of the technology
Recommended publications
  • Cyber Crime and Cyber Terrorism Investigator's Handbook

    Cyber Crime and Cyber Terrorism Investigator's Handbook

    CHAPTER Cybercrime classification and characteristics 12 Hamid Jahankhani, Ameer Al-Nemrat, Amin Hosseinian-Far INTRODUCTION The new features of crime brought about as a result of cyberspace have become known as cybercrime. Cybercrime is growing and current technical models to tackle cybercrime are in- efficient in stemming the increase in cybercrime. This serves to indicate that further preventive strategies are required in order to reduce cybercrime. Just as it is important to understand the characteristics of the criminals in order to understand the motiva- tions behind the crime and subsequently develop and deploy crime prevention strate- gies, it is also important to understand victims, i.e., the characteristics of the users of computer systems in order to understand the way these users fall victim to cybercrime. The term “cybercrime” has been used to describe a number of different concepts of varying levels of specificity. Occasionally, and at its absolute broadest, the term has been used to refer to any type of illegal activities which results in a pecuniary loss. This includes violent crimes against a person or their property such as armed robbery, vandalism, or blackmail. At its next broadest, the term has been used to refer only to nonviolent crimes that result in a pecuniary loss. This would include crimes where a financial loss was an unintended consequence of the perpetrator’s actions, or where there was no intent by the perpetrator to realize a financial gain for himself or a related party. For example, when a perpetrator hacks into a bank’s computer and either accidentally or intentionally deletes an unrelated depositor’s account records.
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used

    Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used

    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
  • Welcome to the Jungle:1 the State Privacy Implications of Spam, Phishing and Spyware

    Welcome to the Jungle:1 the State Privacy Implications of Spam, Phishing and Spyware

    February 2005 Welcome to the Jungle:1 The State Privacy Implications of Spam, Phishing and Spyware Section I: An Overview It’s a Jungle Out There: In an environment in which 53% of all reported fraud complaints to the Federal Trade Commission (FTC) in 2004 were Internet-related, the Internet and email threats of spam, phishing and spyware all are real threats with real consequences.2 They are increasingly used by criminals, instead of just novice teenage hackers3 and can be lucrative alone or in furthering a larger criminal enterprise. Armed with these incentives, spammers, phishers and spyware purveyors are motivated and possess the expertise to avoid the attempts of law enforcement, industry and others to bring these threats in hand. Moreover, while banks, financial institutions, ISPs (Internet Service Providers) and even online auction site users have borne the initial brunt of threats like phishing, other sectors are becoming targets as the first wave of targeted sectors puts in place more effective security measures. This could place government and citizen information at risk of unauthorized disclosure and could lead to serious consequences, such as the release of sensitive homeland security and critical infrastructure information or personal information that could result in identity theft. In addition, spam, phishing and spyware infringe upon citizens’ perceived “right to be left alone” while surfing the Internet and using email. The fact that so many individuals’ privacy has been impacted to varying extents by these threats has compounded their significance. For example, a 2004 phishing attack spoofed4 an email from the FDIC (Federal Deposit Insurance Corporation).
  • Hiscox Cyberclear Glossary Unscrambling Cyber Security Terms Hiscox Cyberclear Glossary

    Hiscox Cyberclear Glossary Unscrambling Cyber Security Terms Hiscox Cyberclear Glossary

    Hiscox CyberClear glossary Unscrambling cyber security terms Hiscox CyberClear glossary Access control Bug The process of granting or denying specific requests or An unexpected and relatively small defect, fault, flaw attempts to: or imperfection in an information system, software D obtain and use information and related information code or device. processing services; and D enter specific physical facilities. Command-and-control server A computer that issues instructions to members of Advanced persistent threat (APT) a botnet. A type of high-level targeted attack carried out by an attacker who has time and resources to plan an infiltration Cookie into a network. These are usually seeking to obtain Files placed on your computer that allow websites to information, proprietary or economic, rather than simple remember details. financial data. APTs are persistent in that the attackers may remain on a network for some time and usually Cyber essentials bypass regular security controls. A government-backed cyber security certification scheme that sets out a good baseline of cyber security. Air gap The base level requires completion of a self-assessment The physical separation or isolation of a system from questionnaire, which is reviewed by an external certifying other systems or networks. body. Cyber essentials plus adds an extra level by requiring tests of systems to be made by the external body. Anti-malware/anti-virus (AV) Software which uses a scanner to identify programs Data loss prevention (DLP) that are, or may be, malicious. A set of procedures and software tools to stop sensitive data from leaving a network. Attack surface All of an organisations internet-facing assets including Distributed denial-of-service attack (DDoS) both hardware and software.
  • Hacking,Phreaking & Carding

    Hacking,Phreaking & Carding

    Hacking, Phreaking, Carding & Social Engineering: back to the r00ts. Workshop della Commissione Calcolo e Reti dell'INFN Hotel Ambasciatori Rimini 11 - 15 giugno 2018 Speaker: Raoul “Nobody” Chiesa DISCLAIMER • This presentation aims to tell you, throught examples and historical case studies which really happened, a piece of history of “telematics”, with a special focus towards the hacking, phreaking and carding scene. • DON’T TRY THIS AT HOME!!! We do not advise to use this material in order to break into telecommunication operators or IT systems. • Anyhow the author cannot be held responsible if you will decide, despite this disclaimer, to explore those systems, evaluating the whole thing as pretty sexy and fascinating, thus starting making mistakes, leaving tracks that would eventually allow the Law Enforcement to identify and bust you… • As a last note, whenever and wherever existing and applicable, the crimes committed and explained in this presentation are from more than 10 years ago, so they are fallen into “prescription” * 1983 # At the very beginning.. • What generated more than 75M USD$ on that year? • Well.. The very same thing that pushed most of us towards a deep interest on some topics… WARGAMES * 1986 # • Cellular phone network, 450 Mhz: the “car phones” or “portable” phones: today we may label them as a personal defense weapon ;) • 300 BPS modem (Bits per Second!) • Fidonet for “the mass” (very few people anyhow) • A few “alternative” boards (BBS), designed for a few l33t users • Family’s fights ‘cause of phone bills (300 BPS modem calls PAID towards USA) «Portable» phones - LOL «Portable» phones - LOL * 1988 # • CEPT2/CEPT3 (1200/75 bps) in Italy, France, Germany, UK, etc.
  • Cybercrime Project: Better Policing Collaborative (BPC) Dr David Hicks

    Cybercrime Project: Better Policing Collaborative (BPC) Dr David Hicks

    Cybercrime Project: Better Policing Collaborative (BPC) Dr David Hicks Dr Siddhartha Bandyopadhyay Mr Nir Tolkovsky Ms Ariana Matsa University of Derby University of Birmingham Inaugural Workshop Centre for Crime, Justice and Policing University of Birmingham 1 July 2016 www.derby.ac.uk Better Policing Collaborative (BPC): This work is funded by the College of Policing, the Higher Education Funding Council for England, and the Home Office and is being carried out as part of a collaborative project of the University of Nottingham, University of Liverpool, University of Birmingham, University of Derby, University Campus Suffolk, Crest Analytics (UK) Ltd and Skills for Justice. www.derby.ac.uk Scope of the project • Identifying the evidence gap through consultation with police and specialist cyber units, businesses and individuals affected by it; • Developing both the evidence base and a practical evidence typology; • Working with force specialist units and/or regional cyber units to: – Provide support via evidence review, evaluation and technical support to shape evidence-based tactical and strategic decisions; – Pool information towards a standardised approach based upon identified good practice within and across forces. www.derby.ac.uk Reductions in crime and victimisation? Office for National Statistics (ONS, 2015) www.derby.ac.uk Preliminary consultations Outreach to law enforcement, businesses, and individuals affected by cybercrime to obtain: 1) A sample of key words for a literature search of academic sources supplemented by professional
  • Case Study Has Been Prepared by the Callista Group with the Kind Permission of BCL

    Case Study Has Been Prepared by the Callista Group with the Kind Permission of BCL

    The Callista Group The commercial consequences of a phreaking attack. Caterham Surrey UK This case study has been prepared by The Callista Group with the kind permission of BCL. BCL’s PABX reseller, maintainer and call air‐time provider declined to be named in this case study and their identity has been withheld. For the purposes of this Case Study they have been referred to as X Ltd. Case Study A bit of background A telephone system for any business is like oxygen ‐ invisible but utterly vital. But it’s also one of any company’s most vulnerable assets because up until now there has been no effective means of securing it from hackers intent on routing their own illegal traffic through it. Phreaking (or phone hacking, toll fraud, dial‐though fraud) is not new. In the 1990s it was principally the domain of adolescents with a phone line and a keyboard looking for a bit of fun and making a couple of calls on someone else’s tab to their friends in Wandsworth or Wellington – just because they could and just for a laugh. So far, so innocuous – but still illegal – and often these calls would go unnoticed amongst the vast number of calls in any month on a company’s phone bill. But phreaking in the 21st Century has gone from geek to something much more sinister and much more damaging. Today it’s big business and organised crime often with links to terrorists intent on raising funds for their illicit activities and the victims of this fraud are their unwitting accomplices because they have to pay.
  • 2015 DATA BREACH INVESTIGATIONS REPORT Ii CONTENTS

    2015 DATA BREACH INVESTIGATIONS REPORT Ii CONTENTS

    2015 DBIR Contributors (See Appendix C for a detailed list.) I VERIZON ENTERPRISE SOLUTIONS 2015 DATA BREACH INVESTIGATIONS REPORT II CONTENTS Introduction ............................................................................................................................................................................. 1 Victim Demographics .......................................................................................................................................................... 2 QUESTIONS? Breach Trends: Looking Back Before Diving Ahead............................................................................................... 4 COMMENTS? Before and Beyond the Breach ........................................................................................................................................ 7 BRILLIANT IDEAS? Indicators of Compromise: “Sharing Is Cyber-Caring” ........................................................................................ 8 We want to hear Phishing: “Attn: Sir/Madam” ...........................................................................................................................................12 them. Drop us a line at [email protected], Vulnerabilities: “Do We Need Those Stinking Patches?”...................................................................................15 find us on LinkedIn, Mobile: “I Got 99 Problems and Mobile Malware Isn’t Even 1% of Them” .................................................18 or tweet @VZdbir Malware: “Volume, Velocity, and
  • How Hackers Think: a Mixed Method Study of Mental Models and Cognitive Patterns of High-Tech Wizards

    How Hackers Think: a Mixed Method Study of Mental Models and Cognitive Patterns of High-Tech Wizards

    HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELS AND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS by TIMOTHY C. SUMMERS Submitted in partial fulfillment of the requirements For the degree of Doctor of Philosophy Dissertation Committee: Kalle Lyytinen, Ph.D., Case Western Reserve University (chair) Mark Turner, Ph.D., Case Western Reserve University Mikko Siponen, Ph.D., University of Jyväskylä James Gaskin, Ph.D., Brigham Young University Weatherhead School of Management Designing Sustainable Systems CASE WESTERN RESERVE UNIVESITY May, 2015 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of Timothy C. Summers candidate for the Doctor of Philosophy degree*. (signed) Kalle Lyytinen (chair of the committee) Mark Turner Mikko Siponen James Gaskin (date) February 17, 2015 *We also certify that written approval has been obtained for any proprietary material contained therein. © Copyright by Timothy C. Summers, 2014 All Rights Reserved Dedication I am honored to dedicate this thesis to my parents, Dr. Gloria D. Frelix and Dr. Timothy Summers, who introduced me to excellence by example and practice. I am especially thankful to my mother for all of her relentless support. Thanks Mom. DISCLAIMER The views expressed in this dissertation are those of the author and do not reflect the official policy or position of the Department of Defense, the United States Government, or Booz Allen Hamilton. Table of Contents List of Tables ....................................................................................................................
  • Phone Phreaking

    Phone Phreaking

    Phone Phreaking Sam Wolfson CSE 120, Winter 2020 Administrivia • Tic-Tac-Toe due tonight! • Checkoff during office hours, or submit on Canvas • LCM Report due Monday • Final Project Design Document due Monday • Talk to course staff if you’d like help brainstorming • Work with a partner!!!! • Next week in section: Innovation Exploration • Presentations will take place both Tues and Thurs • The rest of section will be project work time � Who are the phone phreaks? • People who study, explore, and experiment with telecommunications equipment. • Listen to patterns and tones on telephone lines and attempt to decipher them • Read obscure technical journals about the inner workings of the telephone system • Impersonate operators or other telco employees • Build devices to make the telephone network act in ways not intended by the designers • For the most part, primarily interested in knowledge, but sometimes ended up in legal trouble… How Do Phones Work? (Part 1) • Picking up the phone closes the hook switch, connects the phone to the other person • Vibrations from speaking into the microphone change the resistance and the current flowing in the wires • When the other person speaks, their microphone vibrates your speaker How Do Phones Work? (Part 2) • Phones include a few other parts to make them easier to use • Duplex coil prevents you from hearing your own voice over the speaker • Ringer and keypad – how do they work?? The Phone Network • In reality, you are not directly connected to your conversation partner. � � � 1 OK! 5 2 6 Telephone Office 3 7 4 8 Please connect me to 5! The Phone Network • In reality, you are not directly connected to your conversation partner.
  • THE LOST ART of PHONE PHREAKING Wednesday, September 21, 2011 - 04:13 PM by Sean Cole : Producer, Radiolab

    THE LOST ART of PHONE PHREAKING Wednesday, September 21, 2011 - 04:13 PM by Sean Cole : Producer, Radiolab

    WHERE TO LISTEN CONTACT US THE LOST ART OF PHONE PHREAKING Wednesday, September 21, 2011 - 04:13 PM By Sean Cole : Producer, Radiolab Share Tweet 17 Like 20 Phreak intr.v. phreaked, phreak·ing, phreaks To manipulate a telephone system illicitly to allow one to make Conservative Bloggers Vindicated, Advice calls without paying for them. for Leakers, and More An 11-year-old and his 3D printer Who’s gonna pay for this stuff? A Journalistic Civil War Odyssey A "Blue Box" constructed by Steve Jobs and A New Incentive for Cord Cutters Steve Wozniak (Awaranack/flickr) A Source for Sources Web Only Audio Extra - TV Cord Cutters JOIN THE DISCUSSION [6] Angelina Jolie's Secret Test Results With IRS Scandal, Conservative Bloggers Feel Vindicated ETYMOLOGY: Brooke Gladstone + Cyndi Lauper Alteration of freak1 (influenced by phone) You can’t always trust the dictionary. FEEDS 1) “Phreak” is a noun, as well as a verb – i.e. it was the “phreaks” who “phreaked” the phone system, On The Media : Latest Episodes (Atom) mainly in the 1950’s, 60’s and 70’s when the network was a lot easier to manipulate. On The Media : Latest Stories (Atom) On the Media Feed (Atom) 2) Phreaking wasn’t always manipulative, nor illicit. The first phreaks were geeks, happy to sit and hack week Feed (Atom) thrill at the skeletal rattles and owly drones that ushered phone calls through the network. The best On The Media Podcast phreaks could tell you the purpose of each noise, using words like “supervision,” “panel pulsing” and “m-f-ing” (that is, “multi-frequencing,” not the other thing).
  • Foundations of Network Security

    Foundations of Network Security

    © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Digital_Art/Shutterstock © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION PART 1 © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Foundations of Network Security © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION CHAPTER 1 Fundamentals of Network Security 3 CHAPTER 2 Network Security Threats 31 © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION CHAPTER 3 Common Network Topologies and Infrastructures 67 CHAPTER 4 Network Design Considerations 97 © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning,© Jones LLC & Bartlett Learning LLC, an Ascend Learning© Jones Company. & NOT Bartlett FOR SALE Learning, OR DISTRIBUTION. LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE