Non pc hacking (cars, planes, etc)

  1. “Tampering with a car’s brakes and speed by hacking its computers: A new how-to”
    1. http://arstechnica.com/security/2013/07/disabling-a-cars-brakes-and-speed-by-hacking-its-computers-a-new-how-to/
  2. “Shake, rattle, and roll: How we got a washing machine to text when it’s done”
    1. http://arstechnica.com/business/2012/11/shake-rattle-and-roll-how-we-got-a-washing-machine-to-text-when-its-done/
  3. Researchers from the University of California and University of Oxford in Geneva figured out a way to pluck sensitive information from a person’s head, such as PIN numbers and bank information
    1. http://seattle.cbslocal.com/2012/08/25/scientists-successfully-hack-brain-to-obtain-private-data/
  4. Compromising cars and medical devices
    1. http://www.ted.com/talks/avi_rubin_all_your_devices_can_be_hacked
  5. Hacking google glasses using evil QR code
    1. http://www.cnet.com/news/google-glass-patch-fixes-vulnerability-through-qr-code/
  6. “As previously shown, airport X-ray scanners are indeed subject to hacking and technical exploitation as they are often built with widely available off the shelf technologies, such as Windows XP and WiFi routers.”
    1. http://www.futurecrimes.com/article/hacking-airport-x-ray-machines-terrorist-implications-2/
  7. Bypassing car ECU flashing protections
    1. https://www.defcon.org/images/defcon-21/dc-21-presentations/Illera-Vidal/DEFCON-21-Illera-Vidal-Dude-WTF-in-My-Car-Updated.pdf
    2. Required equipment: http://www.crzforum.com/forum/231917-post15.html
    3. Bi0H4z4rD user here was the presenter: http://www.crzforum.com/forum/cr-z-ecu-tuning-flashpro/15572-dude-wtf-my-car-defcon-21-ecu-talk-2.html
  8. Tool to communicate with vehicle ECUs based on Arduino
    1. https://github.com/fjvva/ecu-tool/
  9. “We have seen the reports from Iran that they used a technique to do what they call “spoofing” to bring down a RQ-170 spy plane of the United States and put it on Display. “..”Humphrey tells Fox News that for a few hundreds dollar his team was able to“spoof” the GPS system on board the drone, a technique that involves mimicking the actual signals sent to the global positioning device and then eventually tricking the target into following a new set of commands. ”
    1. http://www.popsci.com/technology/article/2012-06/researchers-hack-government-drone-1000-parts
  10. TV eavesdropping
    1. https://blog.kaspersky.com/you-watch-samsung-listens/
  11. Infection of biological DNA with digital Computer Code
    1. http://pastebin.com/9vN1ACMH
    2. Comments on the topic of knowledgable people: https://www.facebook.com/groups/majordomo/permalink/10152123560239522/
  12. “Ground-, sea-, and air-based satellite terminals from a broad spectrum of manufacturers—including Iridium, Cobham, Hughes, Harris, and Thuraya—can be hijacked by adversaries who send them booby-trapped SMS text messages and use other techniques, according to a 25-page white paper published by penetration testing firm IOActive. Once a malicious hacker has remotely gained control of the devices, which are used to communicate with satellites orbiting in space, the adversary cancompletely disrupt mission-critical satellite communications (SATCOM). Other malicious actions include reporting false emergencies or misleading geographic locations of ships, planes, or ground crews; suppressing reports of actual emergencies; or obtaining the coordinates of devices and other potentially confidential information.”
    1. http://www.ioactive.com/pdfs/IOActive_SATCOM_Security_WhitePaper.pdf
    2. http://nulzsec.com/2014/04/17/mission-critical-satellite-communications-wide-open-to-malicious-hacking/
  13. “Hacker Says He Can Break Into Airplane Systems Using In-Flight Wi-Fi – Hacker Says He Can Break Into Airplane Systems Using In-Flight Wi-Fi”
    1. http://www.npr.org/sections/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-in-flight-wi-fi
  14. Hardware which can create TDOS – Telephone DOS
    1. http://securityaffairs.co/wordpress/33867/cyber-crime/tnt-gang-released-tdos-tool.html
  15. “Device known as an IP Box that was being used in the phone repair markets to bruteforce the iOS screenlock”
    1. http://blog.mdsec.co.uk/2015/03/bruteforcing-ios-screenlock.html
  16. Executing code on SIM cards
    1. http://www.forbes.com/sites/parmyolson/2013/07/21/sim-cards-have-finally-been-hacked-and-the-flaw-could-affect-millions-of-phones/
    2. https://www.youtube.com/watch?v=wBzb-Zx4rsI
  17. Attacking electrical car charging process
    1. http://conference.hitb.org/hitbsecconf2013ams/materials/D2T2%20-%20Ofer%20Shezaf%20-%20The%20Infosec%20Risks%20of%20Charging%20Electric%20Cars.pdf
  18. Hacking driverless vehicles
    1. https://www.defcon.org/images/defcon-21/dc-21-presentations/Zoz/DEFCON-21-Zoz-Hacking-Driverless-Vehicles.pdf
    2. https://www.youtube.com/watch?v=k5E28fp4oc0
  19. Car immobilizer hacking
    1. https://www.youtube.com/watch?v=7EpJuOrF4CM
  20. Digital Carjackers Show Off New Attacks
    1. https://www.youtube.com/watch?v=oqe6S6m73Zw
  21. “As I drove their vehicles for more than an hour, Miller and Valasek showed that they’ve reverse-engineered enough of the software of the Escape and the Toyota Prius (both the 2010 model) to demonstrate a range of nasty surprises: everything from annoyances like uncontrollably blasting the horn to serious hazards like slamming on the Prius’ brakes at high speeds. They sent commands from their laptops that killed power steering, spoofed the GPS and made pathological liars out of speedometers and odometers. Finally they directed me out to a country road, where Valasek showed that he could violently jerk the Prius’ steering at any speed, threatening to send us into a cornfield or a head-on collision.”
    1. http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/
  22. ” we demonstrate how on two different vehicles that in some circumstances we are able to control the steering, braking, acceleration and display. We also propose a mechanism to detect these kinds of attacks”
    1. http://www.ioactive.com/pdfs/IOActive_Adventures_in_Automotive_Networks_and_Control_Units.pdf
    2. http://blog.ioactive.com/2013/08/car-hacking-content.html
    3. http://illmatics.com/content.zip
  23. “Security Flaw In Four Million Hotel Room Keycard Locks”
    1. http://www.forbes.com/sites/andygreenberg/2012/07/23/hacker-will-expose-potential-security-flaw-in-more-than-four-million-hotel-room-keycard-locks/
  24. “Most Vulnerable Smart Cities to Cyber Attack on Internet of Things (IoT)”
    1. http://thehackernews.com/2015/07/smart-city-cyber-attack.html
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s