Top Hacking Tools That Can Be A Blessing In Disguise : BREACH: - TopicsExpress



          

Top Hacking Tools That Can Be A Blessing In Disguise : BREACH: This is a tool that can gain encrypted information from HTTPS streams. - A new free attack tool was launched at the Black Hat Conference this year that can apparently beat commercial products, which are meant to protect against DDoS attacks. - Trustwave’s Spider Labs showed a tool at the same conference that automates information gathering. This tool can facilitate phishing mails, by making them more convincing. - Mobile security specialists, Bluebox had exhibited at the conference how you can exploit a loophole in the Android OS to make it accept malicious applications. - Lacoon Mobile Security had explained at the conference how one can install surveillance tools on mobile by bypassing the mobile malware detection and device management features. - Kindsight research director Kevin McNamee, brought to the table a method by which users can put a code that turns smartphones into spy sensors can be used through any phone app. - iSec Partners showed how home devices connecting to cellular networks can be hijacked and voice, data and texts stolen. - A team from the Gregoria Institute of Technology came up with a way to build a charger that will allow you to install software on iPhones. - McAfee researchers have taught users how to bypass the Windows 8 OS. - Google’s Bochspwn tool, which has already discovered many flaws in the Windows kernel and driver was also seen at the conference. - Cylance created a tool that can establish how a pseudorandom number generator works. This can enable hackers in figuring out passwords. - A system called CreepyDOL exists, which utilises sensors and open source software to track a target and analyse the data gathered on them. - Mike Ryan, security consultant at iSEC Partners, had demonstrated at the Black Hat how one can track the keys from low energy Bluetooth devices. - White Hat Security demonstrated how the mechanism used by online ad networks can be used to deliver malware. - There is a tool called DropSmack v 2, which can turn DropBox into a backdoor for hacking into corporate networks.
Posted on: Wed, 04 Dec 2013 14:27:55 +0000

Trending Topics



Recently Viewed Topics




© 2015