Tuesday, January 16, 2018

Sunday, January 14, 2018

Friday, January 12, 2018

Wednesday, January 10, 2018

Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets





Meet Broadpwn, a vulnerability in Broadcom's Wi-Fi chipsets which affects millions of Android and iOS devices, and can be triggered remotely, without user interaction. The Broadcom BCM43xx family of Wi-Fi chips is found in an extraordinarily wide range of mobile devices - from various iPhone models, to HTC, LG, Nexus and practically the full range of Samsung flagship devices.
By Nitay Artenstein
Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefi...

Exploiting Network Printers





The idea of a paperless office has been dreamed of for more than three decades. However, nowadays printers are still one of the most essential devices for daily work and common Internet users. Instead of removing them, printers evolved from simple devices into complex network computer systems, installed directly into company networks, and carrying considerable confidential data in their print jobs. This makes them to an attractive attack target.
By Jens Müller
Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefi...

Zero Days, Thousands of Nights: The Life & Times of Zero-Day Vulns and Their Exploits




Zero-day vulnerabilities and their exploits are useful in offensive operations as well as in defensive and academic settings.
RAND obtained rare access to a dataset of information about more than 200 zero-day software vulnerabilities and their exploits - many of which are still publicly unknown. We analyzed these data to provide insights about the zero-day vulnerability research and exploit development industry.
By Lillian Ablon
Read More: https://www.blackhat.com/eu-17/briefi...

Key Reinstallation Attacks: Breaking the WPA2 Protocol





We introduce key reinstallation attacks. These attacks abuse features of a protocol to reinstall an already in-use key, thereby resetting nonces and/or replay counters associated to this key. We show that our novel attack technique breaks several handshakes that are used in a WPA2-protected network.
(By Mathy Vanhoef )@ https://www.blackhat.com
Full Abstract & Presentation Materials:

Tuesday, January 9, 2018

Δοκιμες Πινακα Χαμηλης τασης κατά ΕΝ-61439-1& ΕΝ-61439-2

Δοκιμες Πινακα Χαμηλης τασης κατά ΕΝ-61439-1& ΕΝ-61439-2

Αποτελέσματα Δοκίμων Διηλεκτρικής Δοκιμής Κυρίως Κυκλώματος
-ΦΑΣΗ  R ΜΕ ΦΑΣΗ  S ΑΠΟΤΕΛΕΣΜΑ : OK
-ΦΑΣΗ  R ΜΕ  ΦΑΣΗ  T  ΑΠΟΤΕΛΕΣΜΑ : OK
-ΦΑΣΗ  S  ΜΕ  ΦΑΣΗ  T ΑΠΟΤΕΛΕΣΜΑ : OK

-ΦΑΣΗ  R ΜΕ ΦΑΣΗ  N ΑΠΟΤΕΛΕΣΜΑ : OK
-ΦΑΣΗ  S   ΜΕ ΦΑΣΗ  N  ΑΠΟΤΕΛΕΣΜΑ : OK
-ΦΑΣΗ  T  ΜΕ  ΦΑΣΗ  N ΑΠΟΤΕΛΕΣΜΑ : OK

ΑΡΙΘΜΟΣ ΠΕΔΙΩΝ:
Eλεγχος Εγκατεστημένου Υλικού και Τοποθεσίας
Eλεγχος Μηχανικής Λειτουργιάς
Eλεγχος Γειώσεων
Eλεγχος Λειτουργιάς Ενδεικτικών Λυχνιών
Eλεγχος Λειτουργιάς Μετρητικών Οργάνων
Eλεγχος Μανδαλωσεων
Eλεγχος Ηλεκτρονόμων
Eλεγχος Δευτεροβάθμιας προστασίας Διακόπτων
Δόκιμη Διηλεκτρικής Αντοχής του Κυρίως  Κυκλώματος σε Εφαρμοζόμενη Τάση Βιομηχανικής Συχνότητας 50Hz για 5sec , 2.5kV
Δόκιμη Διηλεκτρικής Αντοχής του Βοηθητικού Κυκλώματος σε Εφαρμοζόμενη Τάση Βιομηχανικής Συχνότητας 50Hz για 5sec , 2.5kV

Saturday, January 6, 2018

MODERN ACTIVE PROTECTION SYSTEM (APS)



There are many examples of active countermeasures. the Russian-made Arena system utilizes a Doppler radar to detect incoming threats and fires a top attack rocket to eliminate the threat. The Israeli Trophy system fires a shotgun-like blast to destroy the threat. An American system known as Quick Kill detects incoming threats using an Active Electronically Scanned Array, which assesses the threat, and deploys a smaller rocket countermeasure.

The Russian T-14 Armata tank features the Afghanit which includes a millimeter-wavelength radar to detect, track, and intercept incoming anti-tank munitions, both kinetic energy penetrators and tandem-charges.





This clip demonstrates the new Chinese-built GL5 APS.





Russia Sosna-R Autonomous Supersonic ADMS Armoured Vehicle




Air defense missile system

--> Structure principles
• missile armament consists of 12 high-speed high-precision maintenance-free missiles SOSNA-R deployed in a launcher. Light weight of the missiles allows to dispose of a transport/loading vehicle from the system
• optimal configuration of surface-to-air guided missile (SAM) payload allows to improve impact effect due to increased weight of spread warheads and application of impact/non-impact laser fuse with continuous circular beam pattern and adaptive burst time
• special multichannel automatic high-precision practically all-weather and day/night optronic control system
• combined missile control system:
- radio command system in start zone
- remote orientation in laser beam after engine division and missile targeting to the line-of-sight
• optronic combat control system with sector scan and in the automate target designation mode provide autonomous target detection capability
Qualities
• high automation of combat processes
• day/night and all-weather capability of combat processes
• concealed fire preparation and high survivability
• unlimited minimum flight altitude of hitting target
• radar and optical countermeasure equipments immunity
• capacity to firing on the move


The system is intended to protect against all types of air threats including high-precision weapons e.g. cruise missiles and guided aircraft missiles in the area of the system responsibility: in range – up to 10 km, in altitude – up to 5 km.
• mount of missile armament with a launcher in one combat vehicle, air search and target tracking equipments, missile flight control units that are combined by integrated optronic combat control system
• high effectiveness of combat application including high-speed and low-flying targets and helicopters during pop-up maneuvers

source