Revision as of 19:35, 22 July 2013 edit24.84.201.74 (talk) →History: please use the talk page for commentary← Previous edit | Revision as of 00:53, 23 July 2013 edit undoHypothetical questions (talk | contribs)1 edit A Black hat question: Is windows update, adobe update, itunes update, etc hackable by hacking into the firmware of home wifi router remotely and replacing part of the firmwire to relabels malware packets as being from microsoft, etc...Next edit → | ||
Line 1: | Line 1: | ||
==Is windows update, adobe update, itunes update, etc hackable by hacking into the firmware of home wifi router remotely and replacing part of the firmwire to relabels malware packets as being from microsoft, etc...== | |||
A question for the black hats... Is it possible to hack into somebody's home router and then modify the router firmware to pretend to be windows update, adobe update, or any update service and to overwrite the previous updates with a virus for the purpose of espinage, ie. taking computer snapshots of screen, web cam snapshots, microphone record, web traffic spying, etc. | |||
The only reason i ask is because this is exactly what i feel like is happening to me... | |||
I talk with malicious staffing companies from india... then, they somehow break into my home network | |||
and send out a bunch of phony windows updates, then the next thing i know... they are laughing | |||
at me on the phone about the stupid things i'm doing on my computer... | |||
and this is all from a computer that is newly installed with just bare windows 7 and 8, and nothing | |||
else installed. i even reverted back to writing my resume in wordpad because i'm terrified of | |||
installing anything on my computer for fear this will weaken the security of my PC... and yet within | |||
10 minutes of a clean format and reinstall...they rehack through my firewall... and msyeriously sneak | |||
in an extra windows update that reinstalls their spyware on my computer... | |||
they also seem to be able to reboot my home router remotely... | |||
because when ever i reflash it back to factory settings... and bring my home wifi router backup... | |||
it myseriously goes down and backup again several hours later... | |||
If that's not what it is...then it sure feels like it. and why the hell is wipro and HCL American | |||
staffing all the semiconductor jobs in the united states... and why the hell do they keep | |||
installing spyware on my computer using these crazy exploits that nobody seems to know | |||
about or know how to fix? | |||
] presenting a briefing in 2005]] | ] presenting a briefing in 2005]] | ||
'''Black Hat Briefings''' is a ] that brings together a variety of people interested in ]. Representatives of government agencies and corporations attend, along with ]s. The Briefings take place regularly in ], ], ], ] and, occasionally, ].<ref>https://www.blackhat.com/html/archives.html</ref> An event dedicated to the Federal Agencies is organized in ]<ref name="foxnews.com">{{cite news|url=http://www.foxnews.com/story/0,2933,206989,00.html|title=Computer Security Conferences Attract Both Hackers, Anti-Hackers | work=Fox News | date=4 August 2006}}</ref> | '''Black Hat Briefings''' is a ] that brings together a variety of people interested in ]. Representatives of government agencies and corporations attend, along with ]s. The Briefings take place regularly in ], ], ], ] and, occasionally, ].<ref>https://www.blackhat.com/html/archives.html</ref> An event dedicated to the Federal Agencies is organized in ]<ref name="foxnews.com">{{cite news|url=http://www.foxnews.com/story/0,2933,206989,00.html|title=Computer Security Conferences Attract Both Hackers, Anti-Hackers | work=Fox News | date=4 August 2006}}</ref> |
Revision as of 00:53, 23 July 2013
Is windows update, adobe update, itunes update, etc hackable by hacking into the firmware of home wifi router remotely and replacing part of the firmwire to relabels malware packets as being from microsoft, etc...
A question for the black hats... Is it possible to hack into somebody's home router and then modify the router firmware to pretend to be windows update, adobe update, or any update service and to overwrite the previous updates with a virus for the purpose of espinage, ie. taking computer snapshots of screen, web cam snapshots, microphone record, web traffic spying, etc.
The only reason i ask is because this is exactly what i feel like is happening to me... I talk with malicious staffing companies from india... then, they somehow break into my home network and send out a bunch of phony windows updates, then the next thing i know... they are laughing at me on the phone about the stupid things i'm doing on my computer... and this is all from a computer that is newly installed with just bare windows 7 and 8, and nothing else installed. i even reverted back to writing my resume in wordpad because i'm terrified of installing anything on my computer for fear this will weaken the security of my PC... and yet within 10 minutes of a clean format and reinstall...they rehack through my firewall... and msyeriously sneak in an extra windows update that reinstalls their spyware on my computer... they also seem to be able to reboot my home router remotely... because when ever i reflash it back to factory settings... and bring my home wifi router backup... it myseriously goes down and backup again several hours later...
If that's not what it is...then it sure feels like it. and why the hell is wipro and HCL American staffing all the semiconductor jobs in the united states... and why the hell do they keep installing spyware on my computer using these crazy exploits that nobody seems to know about or know how to fix?
Black Hat Briefings is a computer security conference that brings together a variety of people interested in information security. Representatives of government agencies and corporations attend, along with hackers. The Briefings take place regularly in Las Vegas, Barcelona, Amsterdam, Abu Dhabi and, occasionally, Tokyo. An event dedicated to the Federal Agencies is organized in Washington, D.C.
History
Black Hat was founded in 1997 by Jeff Moss, who also founded DEF CON. These are considered the premier information security conferences in the world: Black Hat 2009 was attended by 4,000 people. Black Hat started as a single annual conference in Las Vegas and is now held in multiple locations around the world.
The conference
Black Hat is composed of two major sections, the Black Hat Briefings, and Black Hat Trainings. Training is offered by various computer security vendors, in effort to keep the conference vendor-neutral. The conference has hosted the National Security Agency's information assurance manager course, and various courses by Cisco Systems, Offensive Security, and others.
The Briefings are composed of tracks, covering various topics including reverse engineering, identity and privacy, and hacking. The briefings also contain keynote speeches from leading voices in the information security field, including Kevin Mitnick, Robert Lentz Chief Security Officer, United States Department of Defense; Michael Lynn; Amit Yoran, former Director of the National Cyber Security Division of the Department of Homeland Security; and General Keith B. Alexander, Director of the National Security Agency and commander of the United States Cyber Command.
Conference's Topics
. . .
USA :
July - August 2009 : MCS-ATL vulnerabilities // attack against MD2 - Breaking SSL ... validation certificate ...
July - August 2010 : Cloudcracker ... such as (wpacracker.com service)
July 27 - August 1st 2013 : Android hacking : application and root
New Conference Goals
In our time, is now to be focus more on each tools which can be used or protected, so the opening of a new type of conferences called Black Hat Arsenal Briefings
Antics and disclosures
Black Hat is known for the antics of its hacker contingent, and the disclosures brought in its talks. Conference attendees have been known to hijack wireless connections of the hotels, hack hotel TV billing systems, and even hack the automated teller machine in a hotel lobby. In 2009, web sites belonging to a handful of security researchers and groups were hacked and passwords, private e-mails, IM chats, and sensitive documents were exposed on the vandalized site of Dan Kaminsky, days before the conference. During Black Hat 2009, a USB thumb drive that was passed around among attendees was found to be infected with the Conficker virus, and in 2008, three men were expelled for packet sniffing the press room local area network.
In the past, companies have attempted to ban researchers from disclosing vital information about their products. At Black Hat 2005, Cisco Systems tried to stop Michael Lynn from speaking about a vulnerability that he said could let hackers virtually shut down the Internet. However in recent years, researchers have worked with vendors to resolve issues, and some vendors have challenged hackers to attack their products.
See also
References
- https://www.blackhat.com/html/archives.html
- ^ "Computer Security Conferences Attract Both Hackers, Anti-Hackers". Fox News. 4 August 2006.
- http://www.blackhat.com/html/bh-about/about.html
- http://www.blackhat.com/html/bh-dc-09/train-bh-dc-09-index.html
- http://www.blackhat.com/html/bh-europe-09/train-bh-eu-09-index.html
- http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=/www/story/07-10-2009/0005057983&EDATE=
- "Commander of U.S. Cyber Command and National Security Agency Director, General Keith Alexander, To Keynote Day One of Black Hat USA 2013" (Press release). WWBT-TV NBC 12, WorldNow (Gannaway). May 14, 2013. Retrieved June 13, 2013.
- http://blogs.cisco.com/security/black_hat_usa_2009_summary/
- http://blogs.cisco.com/security/black_hat_usa_2010_summary1/
- https://www.blackhat.com/us-13/arsenal.html
- "Hanging with hackers can make you paranoid". CNN. 4 August 2009.
- "Security Expert: PC Media Players Full of Holes". Fox News. 3 August 2007.
- "Microsoft Dares Security Experts to Find Holes in Windows Vista". Fox News. 4 August 2006.
- "Microsoft Challenges Hackers On Vista". CBS News. 3 August 2006.
- http://www.msnbc.msn.com/id/32258426/ns/technology_and_science-security/
External links
This computer security article is a stub. You can help Misplaced Pages by expanding it. |