KingRat

1.2K posts

KingRat

KingRat

@InfoSecZ

Katılım Mart 2013
939 Takip Edilen129 Takipçiler
KingRat retweetledi
Roy🇨🇦
Roy🇨🇦@GrandpaRoy2·
A Russian group has been struggling to achieve a drone detector featuring the TinySA Ultra frequency analyzer that is intuitive to use (as opposed to the confusing settings of the device) but still exploits its full capabilities. They are happier with a new “Patrul” firmware. 1/
Roy🇨🇦@GrandpaRoy2

The Russian “Dronoscope-4” uses a TinySA Ultra spectrum analyzer. It apparently can automatically turn on an EW jammer if certain parameters occur, such as increasing strength in a known FPV video frequency channel. 1/2

English
6
69
288
126.6K
KingRat retweetledi
Don Shift (buy my books)
Don Shift (buy my books)@DonShift3·
@InfoSecZ they contain the same practical info. SHTF if you just want a field manual type book, Poor if you want the essays about UAS in general
English
0
1
1
7
KingRat
KingRat@InfoSecZ·
@DonShift3 Which of your 2 drones book would you recommend if someone was going to purchase just one
English
1
0
0
21
Don Shift (buy my books)
Don Shift (buy my books)@DonShift3·
@InfoSecZ I like something that has a good stand off camera and payload, but in a pinch either will work. Both have trade-offs. A conventional quad copter is probably going to be able to do more but an FPV drone can do sneak and peek better.
English
1
0
1
20
Don Shift (buy my books)
Don Shift (buy my books)@DonShift3·
Why should I buy a drone? What can a drone do for me in spicy times 🌶️ or SHTF? 💩🪭 🧵Detailed examples of potential UAS applications Reconnaissance · Offensive reconnaissance to locate targets to attack · Defensive reconnaissance to look for threats to a static position (encampment, position, property, neighborhood) · Scouting the route ahead of a vehicle, convoy, or patrol · Physical intelligence collection (grabbing and recovering light objects, such as portable radios)
Don Shift (buy my books) tweet media
English
7
13
104
12.1K
KingRat retweetledi
GrapheneOS
GrapheneOS@GrapheneOS·
Our 2-factor fingerprint unlock feature is now fully implemented and will be available in the upcoming GrapheneOS release. This adds the option to set a PIN for using fingerprint unlock. You can use a strong diceware passphrase as the primary unlock method with fingerprint+PIN secondary unlock. The usual restrictions on fingerprint unlock still apply. It's a secondary unlock mechanism only usable for 48 hours after the last primary unlock. The limit on failed fingerprint unlock attempts in GrapheneOS is 5 as opposed to allowing 4 batches of 5 attempts (20 total) with 30s delays in between. The devices we support have a high quality secure element heavily throttling unlock attempts which is why a random 6 digit PIN provides secure encryption, unlike most Android devices. It's nicer to have a strong passphrase not depending on an attacker never being able to exploit the secure element. Our new 2-factor fingerprint unlock feature means you can get this benefit of a strong passphrase while still having the convenience of a PIN. Since our PIN scrambling feature works with the 2nd factor PIN, you get the combined anti-shoulder-surfing benefits of a scrambled PIN and a fingerprint. If you want to avoid entering your passphrase in public, you just need to make sure to refresh the 48 hour timer after last using it to unlock to keep fingerprint unlock available. We plan to add configuration for how many failed fingerprint unlock attempts are allowed to help with this use case. We came up with the concept for this 2-factor fingerprint unlock feature in 2015 and filed it in the public issue tracker in 2016. This was extremely difficult to implement correctly and we needed to fix multiple upstream Android bugs. The lockscreen will be more robust even if you don't use this. This is now one of the flagship features of GrapheneOS alongside hardened_malloc, hardware memory tagging, hardware-level disabling of the USB-C port, Storage Scopes, Contact Scopes, sandboxed Google Play compatibility layer, etc. It will be harder to port to new versions than our existing features. Our duress PIN/password feature is fully compatible with our 2-factor fingerprint unlock and will near instantly wipe the device as usual if you enter the duress PIN instead of the correct 2nd factor PIN for fingerprint unlock. See #duress" target="_blank" rel="nofollow noopener">grapheneos.org/features#duress for more details on that feature.
English
20
84
537
33.7K
KingRat retweetledi
Muqsit 𝕏
Muqsit 𝕏@mqst_·
🍯 If you've never seen or worked with a Honeypot, watch this video. It covers how to setup almost 20+ honeypots (and visualize the data) to trap attackers. Video: youtube.com/watch?v=FjZmhI…
YouTube video
YouTube
Muqsit 𝕏 tweet media
English
2
95
410
26.4K
KingRat retweetledi
Mehdi
Mehdi@MehdiHacks·
🧵 How to maintain and protect your expensive RF equipment ? If you have ever bought RF equipment, even the relatively low-tier ones, you know how expensive they could be, so it's essential to use and maintain them properly to ensure they last long. Here's 5 tips:
Mehdi tweet media
English
7
29
335
25K
KingRat
KingRat@InfoSecZ·
@stfudvs Sweet pupper wish the dog well
English
0
0
1
12
KingRat
KingRat@InfoSecZ·
@cemaxecuter Does it require a special sim or will it work with any sim the cell phone uses
English
1
0
0
97
cemaxecuter
cemaxecuter@cemaxecuter·
Just ran 5Ghoul all the way through again w/ LibreSDR from start to successful exploit. Minor tweaks remaining and it seems like a pretty good kit for cellular experimentation.
cemaxecuter tweet mediacemaxecuter tweet mediacemaxecuter tweet mediacemaxecuter tweet media
English
4
6
93
4.1K
KingRat
KingRat@InfoSecZ·
@ronnieadkins Dumb question is the eagle going to eat the goose?
English
0
0
0
8
Ronnie Adkins
Ronnie Adkins@RonnieAdkins·
Good morning. It’s Thursday December 19th and I hate geese.
Ronnie Adkins tweet media
English
75
35
782
32K
KingRat retweetledi
Sublime Security
Sublime Security@sublime_sec·
Scammers are using distribution lists to hide their tracks while blasting a wide range of targets in this new variant of Living Off the Land (LOTL) + callback phishing attacks. We’ve seen it with trusted brands like Microsoft, Venmo, and PayPal. Learn how the scam works: sublime.security/blog/callback-…
Sublime Security tweet media
English
0
3
8
1.3K
uɐpʇou@ ✸
uɐpʇou@ ✸@notdan·
@InfoSecZ "Privacy Minded" should be enough of a hint that it's general privacy.
English
1
0
2
53
uɐpʇou@ ✸
uɐpʇou@ ✸@notdan·
What is the best solution for both advanced and novice privacy-minded individuals?
English
11
0
6
1.5K
KingRat retweetledi
cemaxecuter
cemaxecuter@cemaxecuter·
I cannot wait to get this all available on the site! Range detection varies based on various conditions, but I was given a report that DJI’s WiFi RID was detected w/ external LNA at 6km. Pairing the hardware w/ a mobile app is 🔥
Lμke Swi☨zer@LukeSwitzer_

WarDragon Pro discovered a DJI Mini 4 remote ID yesterday. With a range over 6km this is shaping up better than imagined. App demo: realtime flight paths, decoded details & system stats. Full product launch from @cemaxecuter incoming!

English
5
7
76
4.9K
KingRat retweetledi
Naomi Brockwell priv/acc
Naomi Brockwell priv/acc@naomibrockwell·
"I have nothing to hide." Here are 10 responses you can use when someone tries to dismiss the importance of privacy with this hackneyed phrase. (Honest question, were there enough cats in my video? 😻)
English
28
127
525
36.4K
KingRat retweetledi
cemaxecuter
cemaxecuter@cemaxecuter·
WarDragon Pro just detected and decoded a WiFi-based drone Remote ID. I plugged the serial number into the FAA's database, and boom—it's a DJI 3! Love seeing it all come together.
English
6
5
111
3.6K
Joel
Joel@joelgaines·
I want to buy 160 acres. No hurricanes. Has to at least have a summer. Remote but accessible. Not 43 bajillion dollars. Where?
English
4.5K
174
7.6K
2.4M