Friday, September 9, 2016
HACKING A SATELITE
Wideband 2GHz to 14GHz Mixer with Integrated LO Frequency Doubler Delivers IF Bandwidth from DC to 6GHz
MILPITAS, CA - March 7, 2016 - Linear Technology announces the LTC5548, a double balanced mixer that operates either as an up- or downconverter with an exceptionally wide frequency range from 2GHz to 14GHz. The LTC5548 features integrated balun transformers at the RF and LO ports, providing 50Ω match from 2GHz to 13.6GHz and from 1GHz to 12GHz at each port, respectively, while enabling single-ended operation. Additionally, the IF port is capable of DC to 6GHz, supporting wideband transmitters and receivers at the baseband. The LTC5548 has high linearity of 24.4dBm IIP3 at 5.8GHz, and 21.4dBm at 9GHz.The LTC5548 simplifies microwave transmitter and receiver designs with its integrated LO buffer, requiring only a 0dBm drive, effectively eliminating an external high power LO amplifier circuit
http://www.linear.com/solutions/7159
Image: J.M. Porup
Hacker conferences are famous for using quirky, hackablebadges. DefCon's 2015 badge was a working vinyl LP containing a spoken-word ciphertext copy of the Hacker Manifesto.But at the Chaos Communication Camp, held in Zehdenick, Germany last week, the organizers did something different: they gave out 4500 rad1o badges. These software-defined radios are sensitive enough to intercept satellite traffic from the Iridium communications network.
During a Camp presentation entitled "Iridium Hacking: please don't sue us," hackers Sec and schneider demonstrated how to eavesdrop on Iridium pager traffic using the Camp badge.
http://motherboard.vice.com/read/its-surprisingly-simple-to-hack-a-satellite
1. Helix 2. 4 Ghz WLAN Antenna (DIY)Hochgeladen am 0. This is my DIY Helix 2. Ghz WLAN Antenna, it has a range of about 2 km & unlike most helix's this has a reflector boom for maximum performance.
2.
System object: comm.DifferentialDecoder
Package: comm
Decode binary signal using differential decoding
http://www.mathworks.com/help/comm/ref/comm.differentialdecoder.step.html
3.
This is a work-in-progress code branch of Django implemented as a third-party app, which aims to bring some asynchrony to Django and expand the options for code beyond the request-response model, in particular enabling WebSocket, HTTP2 push, and background task support.
This is still beta software: the API is mostly settled, but might change a bit as things develop.
https://pypi.python.org/pypi/channels
Tuesday, September 6, 2016
Monday, September 5, 2016
"Smart" windows (electrochromic glass) - The optic electronics device is:
electrochromic glass ("smart" glass), which changes from light to
dark (clear to opaque) and back again, at the push of a button
http://www.explainthatstuff.com/electrochromic-windows.html
http://www.explainthatstuff.com/electrochromic-windows.html
Thermal/optical camouflage with controlled heat emission....20 yellow cakes ready to use
PATENT : http://www.google.com/patents/US4560595
WITCH IS BASICLY THIS...HOWEVER STILL WITH OPTIC-ELECTRONICS..RADIANT BARRIER
http://www.radiantbarrier.com/plus-insulation.htm
WITCH IS BASICLY THIS...HOWEVER STILL WITH OPTIC-ELECTRONICS..RADIANT BARRIER
http://www.radiantbarrier.com/plus-insulation.htm
welcome back to war! Good morning! so, again how to cover a yellow cake
from the gamma rays radar detection? I've been here making a quick
search, and something come up, why not a quartz crystal modulator??? and
how exacly can be used,,, can we skip the vaccum??? we already checked
that vaccum deposit would work...but there's some difficulty on the
right transportation for that! In this case we need to microbalance the
gamma ray frequency...
Quartz crystal microbalance
20 YELLOW CAKES READY TO USE...
I ended the computation discipline for a while, I achieved my goal, I
let you think about it! So, you're saying you have 20 yellow cakes ready
to use? And you say the botton question are in fact the gamma rays
detection; I know that! I've been trought a lot of aspects, including
the temperature, nevertheless gamma emissions cross trought cold; I've
been trough dense materials, and I defintely not overcome the lead
question, because its only possible to cover the nuke with as much dense
lead is, or to replace it, platinium, the most rare and expensive metal
that is; So, don't break our agreement, and I will find a solution.
Ok! I have a break here !!!! electronics !!! let me start by this
"If the metal is not grounded or connected to any other electron source, there will be excess positive charge accumulated on the surface which will stop further photoemission"
in that case we need an eletrostatic material...as a conductor to change the charge
https://en.wikipedia.org/wiki/Conductive_polymer
Ok! I have a break here !!!! electronics !!! let me start by this
"If the metal is not grounded or connected to any other electron source, there will be excess positive charge accumulated on the surface which will stop further photoemission"
in that case we need an eletrostatic material...as a conductor to change the charge
https://en.wikipedia.org/wiki/Conductive_polymer
Sunday, September 4, 2016
You're the top geeks on the world I'm very very proud to have you as my
friends, I said this morning to you, I know something you don't know,
but I don't remember what it is, Jesus doesn't want to me to remember
and doesn't want me to say to you right now; I'm the google cracker :) the first 4 bytes, 4 imput class on a java object must match the firewall code;
"This means making the constructor private or default access ("package-private"), or being in a package controlled by the package.access security property. Immutable classes themselves should declare fields final and protect against any mutable inputs and outputs as described in Guideline 6-2. Construction of immutable objects can be made easier by providing builders (cf. Effective Java [6])."
http://www.oracle.com/technetwork/java/seccodeguide-139067.html#6
"This means making the constructor private or default access ("package-private"), or being in a package controlled by the package.access security property. Immutable classes themselves should declare fields final and protect against any mutable inputs and outputs as described in Guideline 6-2. Construction of immutable objects can be made easier by providing builders (cf. Effective Java [6])."
http://www.oracle.com/technetwork/java/seccodeguide-139067.html#6
How can I access a private constructor of a class?
One way to bypass the restriction is to use reflections:
import java.lang.reflect.Constructor;
public class Example {
public static void main(final String[] args) throws Exception {
Constructor<Foo> constructor = Foo.class.getDeclaredConstructor(new Class[0]);
constructor.setAccessible(true);
Foo foo = constructor.newInstance(new Object[0]);
System.out.println(foo);
}
}
class Foo {
private Foo() {
// private!
}
@Override
public String toString() {
return "I'm a Foo and I'm alright!";
}
}
Cisco Crypto ACLs – Do they really need to match?
When starting out with IPsec tunnels it seems to be a common
misconception that the crypto ACL, sometimes referred to as the
encryption domain or the interesting traffic, must match 100% or be
mirrored at both peers or the tunnel won't come up. This isn't strictly
true. Whilst the ISAKMP phase 1 and IPsec phase 2 proposals must match,
the crypto ACL can be different.
Assume that at the local peer traffic to be encrypted originates from 10.0.0.0/24 and is destined for 192.168.0.0/24. The crypto ACL would be:
But what about the following?
IPsec phase 2 can still be established even though the crypto ACL
isn't mirrored at the local and remove peer. The local peer specifies
10.0.0.0/24 but the remote peer specifies 10.0.0.0/8. In this scenario
IPsec phase 2 can only be initiated from the peer that has the larger
subnet. This is true for both Cisco ASA and IOS.
And in the example above, in the local peer's ACL there's a deny ACE but none on the remote peer's ACL. In this scenario any traffic originating on the local peer from 10.0.0.0/24 destined to 192.168.0.200/32 won't traverse the tunnel. The device (ASA or IOS router) will look at the next crypto map in the sequence and try to match traffic there. If no crypto maps are found it'll flow unencrypted out of the egress interface.
Obviously be careful with mismatching subnets and using deny ACEs in the crypto ACL because you may end up with traffic trying to enter the wrong tunnel and other strange things happening.
https://0wned.it/2014/10/13/cisco-crypto-acls-do-they-really-need-to-match/
Assume that at the local peer traffic to be encrypted originates from 10.0.0.0/24 and is destined for 192.168.0.0/24. The crypto ACL would be:
Local Peer
1
|
access-list crypto_acl permit ip 10.0.0.0 255.255.255.0 192.168.0.0 255.255.255.0
|
Remote Peer
1
|
access-list crypto_acl permit ip 192.168.0.0 255.255.255.0 10.0.0.0 255.255.255.0
|
Local Peer
1
2
|
access-list crypto_acl deny ip 10.0.0.0 255.255.255.0 host 192.168.0.200
access-list crypto_acl permit ip 10.0.0.0 255.255.255.0 host 192.168.0.100
|
Remote Peer
1
|
access-list crypto_acl permit ip 192.168.0.0 255.255.255.0 10.0.0.0 255.0.0.0
|
And in the example above, in the local peer's ACL there's a deny ACE but none on the remote peer's ACL. In this scenario any traffic originating on the local peer from 10.0.0.0/24 destined to 192.168.0.200/32 won't traverse the tunnel. The device (ASA or IOS router) will look at the next crypto map in the sequence and try to match traffic there. If no crypto maps are found it'll flow unencrypted out of the egress interface.
Obviously be careful with mismatching subnets and using deny ACEs in the crypto ACL because you may end up with traffic trying to enter the wrong tunnel and other strange things happening.
https://0wned.it/2014/10/13/cisco-crypto-acls-do-they-really-need-to-match/
Subscribe to:
Posts (Atom)