Category: Cybersecurity

  • Message from the future

    Message from the future

    NotebookLM Google trial with some past notes for eventual book https://notebooklm.google Story notes Podcast generated in ONE MINUTE; only input the story notes (AI boost period)

  • Prompt writer

    Prompt writer

    Following last years check on various solutions, current dominance of Open AI (Microsoft 49% ownership, Apple buying in), Gemini (Google) and eventually Llama (Meta) is visible.Then, high value of prompt writing is by many people confirmed and used. Recent outages (capacity limits at daily peak periods) outline that outside of China the scale of the…

  • SMART-Phones potential

    SMART-Phones potential

    Brief investigation on combined computing power and risks. 1. Global combined capacity of all smartphones 2. Tools to use/control smartphones for grid-computing 3. Smartphone security, forensic via MVT (picture generated by FOTOR (AI) ) Set-up: MVT install (forensic) Grid Computing Wikipedia index (pending decision on Infra) BOINC Github BOINC Alternatives FieldGenius HW: Several Android Smart-phones/…

  • Credibility? – AI Content

    Credibility? – AI Content

    Running Investigation on Content Generation. Ease to automate or AI generate text / media. Listed items are pending check if not otherwise indicated (detailed). WordPress most used Internet Site Management stack (as used for this site adding AI assistance for content generation. was just introduced. DeepAI.org (demo) Inferkit (demo) Credille.ai (demo) Cohere (demo) OpenAI (demo)…

  • Drone shield

    Drone shield

    Trial set-up: Drone approach alert, take control or RF disruption. HW: DJI mini 2, HackRF One, Pixel 7, … SW references: Drone shield commercial; military Drone jamming or spoofing is ilegal, only reviewed for study purpose in relation to defend company/private property under illegal recognition activity via drone. . Legal issues with counter drone tech

  • Data breach 2022

    Data breach 2022

    Verizon Report IBM Report HAI Report

  • Wireshark & CyberChef

    Wireshark & CyberChef

    Easy setup. Investigate Wifi local area and hotspot traffic (e.g. honeypot hotspot). Wireshark traffic logs, filter, decrypt. To perform whitehat pentests.

  • IoT pentest via hackRF and Gnuradio

    IoT pentest via hackRF and Gnuradio

    Set-up end-to-end is complex (here in Parrot Security OS and generic hackRF HW) Recon and Pentest of the growing number of connected devices many with weak security (Car, house radio-keys, RF tags etc.). Basic home or biz pentest: List critical devices and frequency ranges, activate/trigger device and record for post-processing. Security may be OK or…

  • Recon Solr (DB) Nutch (spider)

    Recon Solr (DB) Nutch (spider)

    Set-up medium+ complex (here in Parrot Security OS – Debian Linux distribution). Allows for crawl list of URL’s on flexible depth level with sophisticated keywords, generating crawl results in the Solr DB for subsequent analysis, analytics or export to graphic tools. Publish in dynamic Web site. Nutch tutorial https://www.digitalocean.com/community/tutorials/how-to-install-java-with-apt-get-on-debian-8

  • Phishing-catcher

    Phishing-catcher

    Business can anticipate coming phishing attacks via regular run of the .py script scanning with keyword (e.g. company URL string) new certificat registrations. Then block in firewall and mailing systems. Easy set-up, here in Parrot Security OS (Debian Linux distribution) Source download source and run: pip install -r requirements.txtconfigure/edit: suspicious.yaml and external.yamlrun via: ./catch_phishing.py Seems…