Month: June 2012

Drones can be hijacked by terrorist, Researchers says Vulnerability Exist


Fox News is reporting that researchers say that terrorists or drug gangs, with the right kind of equipment could turn the drones into “suicide” weapons.

A University of Texas researcher illustrated that fact in a series of test flights recently, showing that GPS “spoofing” could cause a drone to veer off its course and even purposely crash. This is particularly worrisome, given that the US is looking to grant US airspace to drones for domestic jobs including police surveillance or even FedEx deliveries

In other words, with the right equipment, anyone can take control of a GPS-guided drone and make it do anything they want it to. Spoofers are a much more dangerous type of technology because they actually mimic a command by the GPS system and convince the drone it is receiving new coordinates. With his device what Humphreys calls the most advanced spoofer ever built (at a cost of just $1,000) he was able to override the signal from space with a more powerful signal from the device.

Congress recently passed legislation paving the way for what the FAA predicts will be somewhere in the region of 30,000 drones in operation in US skies by 2020.Critics have warned that the FAA has not acted to establish any safeguards whatsoever, and that congress is not holding the agency to account.

break up

Cracking WPA2 PSK with Backtrack, Aircrack-ng and John The Ripper

This article will walk you through the steps used to crack a WPA2 encrypted wifi router using Backtrack, aircrack-ng and John the Ripper.

The information provided in this article is meant for educational purposes only. VirtualThreat is a site about computer security and not a site that promotes hacking/cracking/software piracy.  All the information on this site is meant for developing a Hacker Defense attitude among the users and to help prevent the attacks. VirtualThreat and its operators will not be liable for any misuse of this information.

Basic steps :

  •     Put interface in monitor mode
  •     Find wireless network (protected with WPA2 and a Pre Shared Key)
  •     Capture all packets
  •     Wait until you see a client and deauthenticate the client, so the handshake can be captured
  •     Crack the key using a dictionary file (or via John The Ripper)

I’ll use a Dlink DWL-G122 (USB) wireless network interface for this procedure.  In backtrack4, this device is recognized as wlan0.

First, put the card in monitor mode : Read More



apt for cygwin

apt for cygwin

cyg-apt is like apt and makes installing cygwin packages a lot more friendly. I’ve always disliked the clunky setup program that comes with cygwin so this is a really nice improvement.

assuming you have cygwin, wget and python installed

cd /bin
chmod a+rx cyg-apt
cyg-apt setup
cyg-apt update

for more detailed instructions see cygwin-setup

they think better on empty stomach:))


Failure is part of learning

As a man was passing the elephants, he suddenly stopped, confused by the fact that these huge creatures were being held by only a small rope tied to their front leg. No chains, no cages. It was obvious that the elephants could, at anytime, break away from their bonds but for some reason, they did not.

He saw a trainer nearby and asked why these animals just stood there and made no attempt to get away. “Well,” trainer said, “when they are very young and much smaller we use the same size rope to tie them and, at that age, it’s enough to hold them. As they grow up, they are conditioned to believe they cannot break away. They believe the rope can still hold them, so they never try to break free.”

The man was amazed. These animals could at any time break free from their bonds but because they believed they couldn’t, they were stuck right where they were.


Like the elephants, how many of us go through life hanging onto a belief that we cannot do something, simply because we failed at it once before?

Failure is part of learning; we should never give up the struggle in life.

haahahha 3310 :P :D ;)