ELINT.pdf
563.7 KB
📡The E-Intelligence System
"Electronic Intelligence (ELINT), often known as E-Intelligence, is intelligence obtained through electronic sensors. Other than personal communications, ELINT intelligence is usually obtained. The goal is usually to determine a target's capabilities, such as radar placement. Active or passive sensors can be employed to collect data. A provided signal is analyzed and contrasted to collected data for recognized signal types.
The information may be stored if the signal type is detected; it can be classed as new if no match is found. ELINT collects and categorizes data. In a military setting (and others that have adopted the usage, such as a business), intelligence helps an organization make decisions that can provide them a strategic advantage over the competition. The term "intel" is frequently shortened. The two main subfields of signals intelligence (SIGINT) are ELINT and Communications Intel (COMINT)."
#Intelligence #SIGINT #ELINT #radar #signal #Electronic_Warfare #UAV #ESM
"Electronic Intelligence (ELINT), often known as E-Intelligence, is intelligence obtained through electronic sensors. Other than personal communications, ELINT intelligence is usually obtained. The goal is usually to determine a target's capabilities, such as radar placement. Active or passive sensors can be employed to collect data. A provided signal is analyzed and contrasted to collected data for recognized signal types.
The information may be stored if the signal type is detected; it can be classed as new if no match is found. ELINT collects and categorizes data. In a military setting (and others that have adopted the usage, such as a business), intelligence helps an organization make decisions that can provide them a strategic advantage over the competition. The term "intel" is frequently shortened. The two main subfields of signals intelligence (SIGINT) are ELINT and Communications Intel (COMINT)."
#Intelligence #SIGINT #ELINT #radar #signal #Electronic_Warfare #UAV #ESM
👍7❤3🤓1
🤔"Let’s take a computer example: EternalBlue. That’s the NSA code name for an exploit against the Windows operating system, used by the NSA for at least five years before 2017, when the Russians stole it from that agency." - Bruce Schneier told in the book: "A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back"
#NSA #EternalBlue #USA #Russia #Windows #SMB #vulnerability #exploitation #TheShadowBrokers #WannaCry #0day
#NSA #EternalBlue #USA #Russia #Windows #SMB #vulnerability #exploitation #TheShadowBrokers #WannaCry #0day
👍4🤔4❤2🔥1
👍15
Cyber4Drone.pdf
644.7 KB
🕵️♂️Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
#UAV #drone #forensics #artifacts #cellebrite #UEFD_4PC #Magnet_AXIOM #ExtractDJI #Oxygen_Forensics #MKO #security #privacy #integrity #confidentiality #availability #GCS #LOS #BLOS #ADS_B #Threat_Model #Jamming #Cloning #GPS_Spoofing #SW #RF #SkyGrabber #SDR #Deauth #DoS #ESC_PWM #sensor #MITM
#UAV #drone #forensics #artifacts #cellebrite #UEFD_4PC #Magnet_AXIOM #ExtractDJI #Oxygen_Forensics #MKO #security #privacy #integrity #confidentiality #availability #GCS #LOS #BLOS #ADS_B #Threat_Model #Jamming #Cloning #GPS_Spoofing #SW #RF #SkyGrabber #SDR #Deauth #DoS #ESC_PWM #sensor #MITM
👍10❤1
😅Не знаю как можно смотреть без улыбки на такие новости/расследования.
😅I don't know how you can look at such news/investigations without a smile.
📑Who Paid for a Mysterious Spy Tool? The F.B.I., an F.B.I. Inquiry Found.
"When The New York Times reported in April that a contractor had purchased and deployed a spying tool made by NSO, the contentious Israeli hacking firm, for use by the U.S. government, White House officials said they were unaware of the contract and put the F.B.I. in charge of figuring out who might have been using the technology.
After an investigation, the F.B.I. uncovered at least part of the answer: It was the F.B.I."🤣
📑FBI Ordered to Find Out Which Agency Disobeyed White House in Secret Deal, Finds Out It Was Itself.
"Now, several months later, the bureau’s investigation is complete, and it turns out that the agency that disobeyed the White House and purchased the creepy NSO tool was...the FBI."🤣
#NSO_Group #unit8200 #FBI #investigation #WhiteHouse #spy_tools #Pegasus_Spyware
😅I don't know how you can look at such news/investigations without a smile.
📑Who Paid for a Mysterious Spy Tool? The F.B.I., an F.B.I. Inquiry Found.
"When The New York Times reported in April that a contractor had purchased and deployed a spying tool made by NSO, the contentious Israeli hacking firm, for use by the U.S. government, White House officials said they were unaware of the contract and put the F.B.I. in charge of figuring out who might have been using the technology.
After an investigation, the F.B.I. uncovered at least part of the answer: It was the F.B.I."🤣
📑FBI Ordered to Find Out Which Agency Disobeyed White House in Secret Deal, Finds Out It Was Itself.
"Now, several months later, the bureau’s investigation is complete, and it turns out that the agency that disobeyed the White House and purchased the creepy NSO tool was...the FBI."🤣
#NSO_Group #unit8200 #FBI #investigation #WhiteHouse #spy_tools #Pegasus_Spyware
😁15❤6👍6🤡3
Forwarded from Mobile Adventures
Хочу закончить посты с годной, по моему мнению, конференции двумя интересными видео.
Inside Apple's Lighting: JTAGing The iPhone for Fuzzing And Profit где рассказывается что такое lightning, как он работает и как его использовать для различных нужд, в том числе и для извлечения информации.
По данной теме друже Шизо, поклон ему, делал пост
Affordable EMFI Attacks Against Modern IoT Chips. Здесь рассказывают что нужно и как провести EMFI (Electromagnetic Fault Injection) атаку на энергоэффективный чип Espressif ESP32-C3 и расскажут про профиты от таких атак (их много ;)). Репозиторий со списком аппаратуры и ПО тут
Inside Apple's Lighting: JTAGing The iPhone for Fuzzing And Profit где рассказывается что такое lightning, как он работает и как его использовать для различных нужд, в том числе и для извлечения информации.
По данной теме друже Шизо, поклон ему, делал пост
Affordable EMFI Attacks Against Modern IoT Chips. Здесь рассказывают что нужно и как провести EMFI (Electromagnetic Fault Injection) атаку на энергоэффективный чип Espressif ESP32-C3 и расскажут про профиты от таких атак (их много ;)). Репозиторий со списком аппаратуры и ПО тут
YouTube
Inside Apple's Lightning: JTAGging The IPhone For Fuzzing And Profit by Thomas Roth
Abstract:
----------------
If you've been around the iPhone hacking scene you probably heard about the mysterious cables named after different monkeys: Kanzi Cable, Kong Cable, Bonobo Cable - all these cables allow you to get JTAG debugging capabilities on…
----------------
If you've been around the iPhone hacking scene you probably heard about the mysterious cables named after different monkeys: Kanzi Cable, Kong Cable, Bonobo Cable - all these cables allow you to get JTAG debugging capabilities on…
😢73👍39❤21🤯4😎1
The owner of this channel has been inactive for the last 1 month. If they remain inactive for the next 7 days, they may lose their account and admin rights in this channel. The contents of the channel will remain accessible for all users.