Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Goodbye to the security queues. Discover how to register your backpack without touching it using any WiFi network

      Recommended Posts

      Staff

       

      If you are tired of queuing at security checkpoints at airports, stations or museums you are in luck. A team of researchers has found the definitive method to snoop on your bags without even having to touch you. It is cheap, accurate and works on wifi. 

      The method is so good that it has already been awarded the first prize at the recent IEEE Conference on Telecommunications and Network Security held this year in Beijing. In fact it is so simple that it is hard to believe that it has not occurred to anyone before.

      The signal of WiFi networks bounces off objects of a certain density, but crosses the finest and lightest cleanly. Researchers have discovered that the waves of WiFi networks penetrate perfectly in bags, suitcases and backpacks. Analyzing the way they bounce off the objects inside these containers, the authors of the study have been able to determine if the backpack has metal objects or liquids.

      The tests have been made with 15 different objects in six different types of bags, suitcases and backpacks. In plastic bags, the accuracy with which suspicious objects are detected as electronic or explosive devices is 99%. Metal objects are identified by 98%, and liquids by 95%. This effectiveness is reduced to 90% in suitcases or if the object is wrapped in several layers of materials that hinder the passage of waves. All in all, it remains a more than applicable precision in a real environment.

      The authors of the study explain that their technique does not completely replace safety records, but minimizes them because it allows them to direct people carrying suspicious objects to the safety line and let the rest pass with the assurance that they do not carry anything dangerous . The technique only involves installing three additional WiFi antennas and works on any existing network. It is cheap and can detect explosives, weapons, bulky metal objects and even acids or drugs. The next step is to adjust the system to determine the exact shape of the object and the amount of liquid.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. PwnFox
          PwnFox is a Firefox/Burp extension that provides usefull tools for your security audit.
          If you are a chrome user you can check https://github.com/nccgroup/autochrome.
          Single click BurpProxy
          Connect to Burp with a simple click, this will probably remove the need for other add-ons like foxyProxy. However, if you need the extra features provided by foxyProxy you can leave this unchecked.
          Containers Profiles
          PwnFox gives you fast access to Firefox containers. This allows you to have multiple identities in the same browser. When PwnFox and the Add container header option are enabled, PwnFox will automatically add an X-PwnFox-Color header to highlight the query in Burp.
          PwnFoxBurp will automatically highlight and strip the header, but you can also specify your own behavior with addons like logger++.
          Security header remover
          Sometimes it’s easier to work with the security header disabled. You can now do it with a single button press. Don’t forget to reenable them before testing your final payload.
          Headers stripped:
              Content-Security-Policy
              X-XSS-Protection
              X-Frame-Options
              X-Content-Type-Options


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The Best WordPress Security Plugin to
          Secure & Protect WordPress
          Built by the WordPress security experts
          iThemes Security Pro takes the guesswork out of WordPress security. You shouldn’t have to be a security professional to use a security plugin, so iThemes Security Pro makes it easy to secure & protect your WordPress website.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. watermark_disabler
          Disabling "Activate Windows" watermark made simple, the code in this repository is a PoC, and has not been tested above Windows 10 1803.
          How does this work?
          The function responsible for drawing whole desktop including the watermark is xxxDesktopPaintCallback located in win32kfull.sys. Both of the approaches used by this project were found while analyzing functions further down in the callstack.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. HawkScan
          Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)
          This script uses “WafW00f” to detect the WAF in the first step.
          This script uses “Sublist3r” to scan subdomains.
          This script uses “waybacktool” to check in waybackmachine.
          Features
               URL fuzzing and dir/file detection
               Test backup/old file on all the files found (index.php.bak, index.php~ …)
               Check header information
               Check DNS information
               Check whois information
               User-agent random or personal
               Extract files
               Keep a trace of the scan
               Check @mail in the website and check if @mails leaked
               CMS detection + version and vulns
               Subdomain Checker
              Backup system (if the script stopped, it take again in the same place)
               WAF detection
               Add personal prefix
              Auto-update script
               Auto or personal output of scan (scan.txt)
               Check Github
              Recursive dir/file
              Scan with an authentication cookie
               Option –profil to pass profil page during the scan
               HTML report
               Work it with py2 and py3
              Add option rate-limit if the app is unstable (–timesleep)
              Check-in waybackmachine
               Response error to WAF
              Check if DataBase firebaseio exist and accessible
              Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30
               Search S3 buckets in source code page
               Testing bypass of waf if detected
               Testing if it’s possible scanning with “localhost” host
          Changelog v1.5.3
               – add setup.sh


          Hidden Content
          Give reaction to this post to see the hidden content.