Top hacker shows us how it’s done | Pablos Holman

KALA
2 min readJan 28, 2021

Ariana Bleau Lugo So this is a hotel room,kind of like the one I’m staying in. I get bored sometimes. A room like this has not a lotto offer for entertainment. But for a hacker, it gets a littleinteresting because that television is not like the television in your home, it’s a node on a network. Right? That means I can mess with it.

If I plug a little devicelike this into my computer, it’s an infrared transceiver,I can send the codes that the TV remote might sendand some other codes. So what?Well, I can watch movies for free. That doesn’t matter to me so much,but I can play video games too. Hey, but what’s this? I can not only do thisfor my TV in my hotel room, I can control your TV in your hotel room.

So I can watch youif you’re checking out with one of these, you know, TV based registration things, if you’re surfingthe web on your hotel TV, I can watch you do it. Sometimes it’s interesting stuff. Funds transfer. Really big funds transfers. You never know what peoplemight want to do while they’re surfing the webfrom their hotel room.

The point is I get to decideif you’re watching Disney or porn tonight. Anybody else staying at the Affinia hotel?

This is a project I worked onwhen we were trying to figure out the security properties of wirelessnetworks; it’s called the “Hackerbot“. This is a robot we’ve built that candrive around and find Wi-Fi users, drive up to them and show themtheir passwords on the screen.

We just wanted to build a robot, but we didn’t knowwhat to make it do, so — We made the pistolversion of the same thing. This is called the “Sniper Yagi“. It’s for your long-rangepassword sniffing action, about a mile away I can watchyour wireless network. This is a project I worked on withBen Laurie to show passive surveillance.

So what it is, is a mapof the conference called “Computers, Freedom and Privacy“. And this conference wasin a hotel, and what we did is we, you know, put a computer in each room of the conference that logged all the Bluetooth traffic.

So as everybody came and went with their phones and laptops we were able to just log that,correlate it, and then I can print out a map like thisfor everybody at the conference. This is Kim Cameron,the Chief Privacy Architect at Microsoft. Unbeknownst to him, I got to see everywhere he went. And I can correlate thisand show who he hangs out with (phone dialing)when he got bored, (phone dialing)hangs out in the lobby with somebody.

To read more please visit https://www.kalilinuxtips.online/top-hacker-shows-us-how-its-done-pablos-holman/

--

--

KALA

Welcome to Kali linux tips medium blog we will keep you updated on cyber security world for more info kindly visit: https://kalilinuxtips.online