Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      Goodbye to the security queues. Discover how to register your backpack without touching it using any WiFi network

      1 post in this topic


      If you are tired of queuing at security checkpoints at airports, stations or museums you are in luck. A team of researchers has found the definitive method to snoop on your bags without even having to touch you. It is cheap, accurate and works on wifi. 

      The method is so good that it has already been awarded the first prize at the recent IEEE Conference on Telecommunications and Network Security held this year in Beijing. In fact it is so simple that it is hard to believe that it has not occurred to anyone before.

      The signal of WiFi networks bounces off objects of a certain density, but crosses the finest and lightest cleanly. Researchers have discovered that the waves of WiFi networks penetrate perfectly in bags, suitcases and backpacks. Analyzing the way they bounce off the objects inside these containers, the authors of the study have been able to determine if the backpack has metal objects or liquids.

      The tests have been made with 15 different objects in six different types of bags, suitcases and backpacks. In plastic bags, the accuracy with which suspicious objects are detected as electronic or explosive devices is 99%. Metal objects are identified by 98%, and liquids by 95%. This effectiveness is reduced to 90% in suitcases or if the object is wrapped in several layers of materials that hinder the passage of waves. All in all, it remains a more than applicable precision in a real environment.

      The authors of the study explain that their technique does not completely replace safety records, but minimizes them because it allows them to direct people carrying suspicious objects to the safety line and let the rest pass with the assurance that they do not carry anything dangerous . The technique only involves installing three additional WiFi antennas and works on any existing network. It is cheap and can detect explosives, weapons, bulky metal objects and even acids or drugs. The next step is to adjust the system to determine the exact shape of the object and the amount of liquid.

      Share this post

      Link to post
      Share on other sites
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content. Security Engineering for the IoT
          A Gudie to Security Solution of the IoT System

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By 1337day-Exploits
          Microsoft Windows suffers from an Internet Settings misconfiguration security feature bypass vulnerability. Versions affected include Windows 7 SP1, 8.0, 8.1 x86 and x64 with full patches up to July 2019.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Hidden Content
          Give reaction to this post to see the hidden content.

          View File Top 100 Hacking & Security E-Books
          Top 100 Hacking & Security E-Books (Free Download)
          S.No E-Book (PDF Link) Total Pages 1. Advanced Penetration Testing 269 Pages 2. The Basics of Web Hacking 179 Pages 3. The Basics of Hacking and Penetration Testing 178 Pages 4. The Art of Deception by Kevin Mitnick 577 Pages 5. SQL Injection Attacks and Defense 761 Pages 6. Metasploit - The Penetration Tester's Guide 332 Pages 7. Ethical Hacking and Penetration Testing Guide 523 Pages 8. Network Attacks and Exploitation - A Framework 219 Pages 9. Python Web Penetration Testing Cookbook 224 Pages 10. Wireshark for Security Professionals 391 Pages 11. Mastering Modern Web Penetration Testing 298 Pages 12. The Shellcoder's Handbook 745 Pages 13. The Little Black Book of Computer Viruses 183 Pages 14. XSS Attacks - Cross Site Scripting Exploits and Defense 482 Pages 15. The Web Application Hacker's Handbook 771 Pages 16. Ethical Hacking and Countermeasures 239 Pages 17. Reversing - Secrets of Reverse Engineering 619 Pages 18. Network Security Bible 697 Pages 19. Hacking Web Applications - Hacking Exposed 416 Pages 20. Hacking for Dummies 387 Pages 21. Hacking Wireless Network for Dummies 387 Pages 22. Ninja Hacking - Unconventional Penetration Testing Tacting and Techniques 314 pages 23. Professional Penetration Testing 525 Pages 24. Gray Hat Hacking - The Ethical Hacker's Handbook 577 Pages 25. Hack Attacks Testing 561 Pages 26. Basic Security Testing with Kali Linux 242 Pages 27. Mastering Kali Linux for Advanced Penetration Testing 356 Pages 28. Kali Linux CTF Blueprints 190 Pages 29. Kali Linux Cookbook 261 Pages 30. Kali Linux - Assuring Security by Penetration Testing 454 Pages 31. Information Security Management Handbook 3206 Pages 32. Computer and Information Security Handbook 877 Pages 33. CISSP - Certified Information Systems Security Professional 804 Pages 34. Computer Security and Cryptography 542 Pages 35. Python for Kids 348 Pages 36. End to End Network Security - Defense-in-Depth 469 Pages 37. A Guide to Computer Network Security 483 Pages 38. Essential Computer Security 321 Pages 39. Security in Wireless Mesh Networks 548 Pages 40. Hacking Windows XP (OLD) 379 Pages 41. Hacking Exposed - Windows Security, Secrets and Solutions 482 Pages 42. Hacking Exposed - Network Security, Secrets and Solutions 736 Pages 43. Information Security - Principles and Pratice 413 Pages 44. Nessus, Snort and Ethereal Power Tools 472 Pages 45. Active Defense - A Comprehensive Guide to Network Security 374 Pages 46. Information Security Fundamentals 262 Pages 47. Wireless Network Security 422 Pages 48. Red Hat Linux Security and Optimization 721 Pages 49. Windows Forensics Analysis 386 Pages 50. Mobile and Wireless Network Security and Privacy 232 Pages 51. Firewalls and Internet Security 456 Pages 52. An Introduction to Computer Security - The NIST Handbook 290 Pages 53. Unauthorized Access - Physical Penetration Testing for IT Security Teams 309 Pages 54. Testing Web Security 297 Pages 55. Maximum Security - A Hacker's Guide to Protecting Your Internet Site and Network 670 Pages 56. Information Resource Guide - Computer, Internet and Network Systems Security 325 Pages 57. The Hacker's Underground Handbook 116 Pages 58. Guide to SCADA and Industrial Control Systems Security 164 Pages 59. The International Handbook of Computer Security 274 Pages 60. The Code Book - How to Make It, Break It, Hack It, Crack It 273 Pages 61. Linux 101 Hacks 271 Pages 62. Introduction to Linux - A Hands on Guide 223 Pages 63. Bluetooth Security 222 Pages 64. IT Governance - A Manager's Guide to Data Security and ISO 27001/27002 385 Pages 65. Batch File Programming 155 Pages 66. Cracking the Coding Interview 310 Pages 67. Dictionary of Networking 465 Pages 68. Hacking Gmail 310 Pages 69. Linux Complete Command Reference 1528 Pages 70. Practical Hacking Techniques and Countermeasures 752 Pages 71. The Art of Intrusion by Kevin Mitnick 291 Pages 72. Hack Notes - Windows Security Portable Reference 289 Pages 73. Hacing - The Next Generation 298 Pages 74. Hacking the Cable Modem 330 Pages 75. Hackers Beware - Defending Your Network From The Wiley Hacker 817 Pages 76. Hack Proofing Your Network 826 Pages 77. Hack Attacks Revealed 837 Pages 78. Dissecting the Hack - The F0rb1dd3n Network 441 Pages 79. TCP/IP Guide 1671 Pages 80. Offensive Security - Wireless Attacks - WiFu 385 Pages 81. Google Hacking - For Penetration Testers 529 Pages 82. Computer Forensics Investigating Network Intrusions and Cyber Crime 394 Pages 83. Hakin9 Bible 207 Pages 84. Network Forensics - Tracking Hackers Through Cyberspace 574 Pages 85. Computer Forensics - Investigating Data and Image Files 227 Pages 86. Penetration Testing and Network Defense 625 Pages 87. Hacking Exposed - Malware and Rootkits 401 Pages 88. Malware Analyst's Cookbook 746 Pages 89. Mobile Malware - Attacks and Defense 386 Pages 90. Java 2 Network Security 702 Pages 91. A Bug Hunter's Diary 212 Pages 92. Viruses Revealed - Undestand and Counter Malicious Software 721 Pages 93. Figital Forensics With Open Source Tools 289 Pages 94. SSH, The Secure Shell - The Definitive Guide 438 Pages 95. Pro PHP Security 369 Pages 96. Zero Day Exploit - Countdown to Darkness 363 Pages 97. Metasploit Penetration Testing Cookbook 269 Pages 98. 24 Deadly Sins of Software Securtiy 433 Pages 99. Botnets - The Killer Web App 482 Pages 100. Hacker Highschool - Hack School for Beginners (ZIP) 12 Books
          You can download these books and guides for free if you are a PRIV8 user. 
          Submitter dEEpEst Submitted 16/09/19 Category Libro Online Password ********