Wednesday, February 27, 2019
ok...just a quick explanation, for the public unaware of computing...common printers hacking works like this...as far as I know SIS has the ports hidden or blocked (as banks) therefore, the nmap command must be -sp...which, I don't think lots of people knew, or it would be considered a seriouse flaw. So watch the video, and see how the man did it...after using the UI on python ( the most versatile language) and broke their security...after doing this...he closed his phone, and went home, and printed somewhere..but the idea of the "alive" IoT...was to robb banks...ok?..get inside the firewall...
Subscribe to:
Post Comments (Atom)
-
Um grupo anarquista internacional, sediado em Atenas na Grécia, designado por PHK, pretende comprar por 50.000 euros, uma bomba radioactiva ...
-
I am currently developing an APP to create a communication field between two devices over Wi-Fi tethering and TCP protocols. The first o...
No comments:
Post a Comment