Showing posts with label Exploitation. Show all posts
Showing posts with label Exploitation. Show all posts

Friday, January 18, 2013

US Defense Project to inject and extract data from network cables without any physical contact

US Department again come up with Cyber project called as Tactical Electromagnetic Cyber Warfare Demonstrator program. The main idea behind this project is that to inject, exploit and extract data from network cables without any physical contact.

This project seems to new way of spying peoples and getting in networks by simple electronics emit an electromagnetic signal theory. It is possible to get signals by tempered them using radio waves.
This kind of projects also rise questions for security experts that how they are going to secure them so they can't be exploited.


This is not going to easy for US Defense because if some one use coaxial cables, instead of Cat 5 or Cat 6 cables then it will be very low vulnerable. Coaxial cable has very low radiation losses and low susceptibility to external interference.

Thursday, August 16, 2012

$2 Million Bounty for Exploiting google Chrome, Can you do so ??

After the success of the first Pwnium competition held earlier this year , Google has announced the second Pwnium competition; In this Pwnium 2, google had increased its bug bounty offering to security researchers.

This time it’s putting a total of $2 million in rewards on the table for anyone who can find bugs in its browser, exploit them, and tell Google’s security team the details of their techniques.


The Pwnium 2 will be held on Oct 10th, 2012 at the Hack In The Box 10 year anniversary conference in Kuala Lumpur, Malaysia.

Google is offering up to $60,000 for a single working Chrome exploit. While several other companies including Mozilla, PayPal and Facebook offer bug bounties, none publicly offers such a high sum.

"Exploits should be demonstrated against the latest stable version of Chrome. Chrome and the underlying operating system and drivers will be fully patched and running on an Acer Aspire V5-571-6869 laptop (which we’ll be giving away to the best entry.)"Google blog posts reads.

"Exploits should be served from a password-authenticated and HTTPS Google property, such as App Engine. The bugs used must be novel i.e. not known to us or fixed on trunk. Please document the exploit."