Agents of the Revolution
  • Content count

  • Joined

  • Last visited

Community Reputation

-2 Noobie

About Zapperlink

  • Rank
    "I Hack, therefore, I am"
  • Birthday 10/14/1982

Profile Information

  • Gender
  • Country
    United States

Recent Profile Visitors

13,592 profile views
  1. I would bet at Zigbee or Bluetooth. You can use something like or similar alternatives to listen and see if you see anything come up. Bluetooth is the same boat Evaluation and Development Kits%2C Boards&utm_source=google&utm_medium=cpc&utm_campaign=Shopping_Product_RF%2FIF and RFID_NEW&utm_term=&utm_content=RF Evaluation and Development Kits%2C Boards, just listen for traffic and narrow it down. Software-wise, there are a variety of solutions out there but, Btlejack you can use for Bluetooth, Zigbee you can use Wireshark paired with ti's packet sniffer.
  2. TLDR: This open source initiative involving encryption and creative methodologies were awesome talking points at defcon 22 and 23. Give it a glance if you're interested in what people have been doing to flex the usefulness of encryption.
  3. But what about the Obama administration and IRS targeting the Tea Party? Well, what if I'm a tea party supporter? All of a sudden the IRS could be paying particular attention to me just because I text/call my fellow Tea Party supporters. Maybe even, I end up getting pulled over all the time, screened by TSA, etc... Just because my name ends up on some government database as a "Tea Party supporter". Or if somebody eaves dropping on my conversations just decides to make life difficult because they dislike my person beliefs for whatever reason? That's why its illegal and unconstitutional. However, that seems to no longer apply. Well we can speculate scenarios of targeted attacks, but from the goal of information, who you call is already information obtained, what you do and say on that call is what I believe people generally want to protect. I could be entirely wrong from my perspective but the value of protecting communication technologies as a standard for both the citizen and the government should be just that, a standard, a minimum level of expectation of the devices leveraging the communication technologies.
  4. As a civilian it really depends. Is defining yourself as a civilian meaning you do not care about privacy or are you assessing your needs based on risk? One could say that everyone needs it as a baseline, because as technology evolves, the ability to add basic line of features is more and more possible, and now people are saying that it SHOULD be a baseline to have end to end call encryption. However does the average person actually carry a conversation that would be considered confidential enough to matter, not likely. I think the conversation opens up more as a standardization opportunity with the recent events of infrastructure security and spying.
  5. o7
  6. To be quite honest I see this as a productive method of learning. Look outside the box for a moment. He is developing skills at not only debugging a production quality game, he is taking the time, effort, and resources to tinker with something in hopes to overcome its natural boundaries. Unless he is all er33t and already knows how to get this to work... he will gain a variable of new information. It's not what your hacking, its what you gain from the experience.
  7. Keep in mind a lot of games do not just identify a network identifier, some use registered game keys to block you so not even a proxy will defeat that.
  8. OSx86 works fine on some netbooks. The Dell Mini9/VostroA90 where perfect for it. The problem with 10.6 is that it is too new for a working x86 hack to be out and about yet. And with the large variety of netbooks, its a crapshoot. Almost always you will find Dell based systems working with OSx86, seems to be the closest you can get to the real deal. Some googling and as mentioned before, floating the pirate seas, you will find exactly what your looking for.
  9. Well those two topics are somewhat in different directions. Exploiting copy prevention can take you anywhere from the generic DVD ripping community all the way into the encryption community. Net based services and applications will generally take you deeper into the programming community and networking community where you will have to both understand how the service end works and how it communicates. My best recommendation for you to get started is to understand more about both of these directions. Look at what other people have done to exploit services, how reverse engineering works and what challenges they have faced along the way. Most of your learning will be via trial and error as everyone has done. For entertainment value I recommend adding CtoF wargames and generic level based wargames as a fun way to grow your skills at first.
  10. Well, first off welcome to BinRev. I think the best point to go from here is to absorb as much understanding about the field as you can. As most people I believe would agree in the InfoSec and CS fields, learning programming is a great skill to contribute to your toolbox. I would recommend continuing your education to expand into perl as you will find it is greatly used by the community. Depending on your overall field of interest you may want to pick up a vmware server or workstation, xen, you get the idea and start digging into the variety of flavors of OS's out there. If your interests are exploiting and protecting net-based services, the best direction would be to understand how they work, install them, break them.. tweak them, most importantly have fun with them. I think the most of what drives people is the constant tinkering with what is already blatantly there and self teaching beyond what your average person would put interest into. There are tons of resources online that can help you out, all you simply need to do is google the key word that buys your interest. If you find yourself stuck on something then this is a avenue in your resources where you can ask a question and depending on the question we can either assist you or point you in the right direction.
  11. I know I'm derailing my own topic now. How would any electronic equipment function after a nuke? Simply put, it wouldn't. However there needs to be a critical definition of "emergency control of the internet" and what dimensions does that go to. Does that mean he can order FBI to review addresses of ISP connections? Review your VOIP calls? Use your connection to DDoS?
  12. Carls Jr: Fuck you, I'm Eating!