Posted on Aug 10, 2017
Chinese satellite sends 'hack-proof' message - BBC News
1.32K
8
13
2
2
0
Posted >1 y ago
Responses: 2
pffft hack proof, right... If it was hack proof you wouldn't be announcing it was hack proof now would you...
(1)
(0)
Cpl Benjamin Long
and if they use SHA-256 encoding you can crack it with a bitcoin mining rig like it is a normal bitcoin transaction since the rig is an ASIC processor designed specifically to decrypt SHA256
(0)
(0)
Cpl Benjamin Long
https://www.newegg.com/Product/Product.aspx?Item=9SIA76H60S2706&ignorebbr=1&nm_mc=KNC-GoogleMKP-PC&cm_mmc=KNC-GoogleMKP-PC-_-pla-_-Accessories+-+Case+%2F+Rackmount-_-9SIA76H60S2706&gclid=Cj0KCQjwiLDMBRDFARIsACNmiX-qVEQy1Igcejujqg4NlVtm5fPl0rT6JNn55xyNc5cULtxdcdNmSIUaAnm5EALw_wcB&gclsrc=aw.ds
https://security.stackexchange.com/questions/62800/is-it-possible-to-use-bitcoin-miners-to-decrypt-files-communication
https://www.blackmoreops.com/2014/03/10/cracking-wifi-wpawpa2-passwords-using-pyrit-cowpatty/
http://www.kali.org
Read any book authored by Kevin Mitnick
https://security.stackexchange.com/questions/62800/is-it-possible-to-use-bitcoin-miners-to-decrypt-files-communication
https://www.blackmoreops.com/2014/03/10/cracking-wifi-wpawpa2-passwords-using-pyrit-cowpatty/
http://www.kali.org
Read any book authored by Kevin Mitnick
8 GPU Aluminum Stackable Open Air Mining Case Computer Frame Rig Ethereum Veddha - Newegg.com
Buy 8 GPU Aluminum Stackable Open Air Mining Case Computer Frame Rig Ethereum Veddha with fast shipping and top-rated customer service. Once you know, you Newegg!
(0)
(0)
Cpl Benjamin Long
Also, normal cracking operation is the hash is captured by the recon team... they set up their analyzers like Airomon-ng with Airodump-ng which are tools that black hats and white hats use, if they are penetrating a Wifi. If they are cracking user log then they will set up wireshark with a MITM(Arp poisoning) scenario to eavesdrop on network traffic.
Once their net analysis captures a password hash, they will transfer it to the cracking team, who will run it through pyrit at a fixed installation with massive server capability to crack the password using a bruteforce.
Once the password is cracked they will log onto info systems and dump all data and then will use it in a manner consistent with their mission statement
Once their net analysis captures a password hash, they will transfer it to the cracking team, who will run it through pyrit at a fixed installation with massive server capability to crack the password using a bruteforce.
Once the password is cracked they will log onto info systems and dump all data and then will use it in a manner consistent with their mission statement
(0)
(0)
Read This Next