«
Expand/Collapse
110 items tagged "twitter"
Related tags:
drupal [+],
read [+],
arduino [+],
hackers [+],
facebook [+],
darknet [+],
account [+],
third party [+],
spoofing [+],
sms [+],
privacy [+],
ubuntu [+],
txt [+],
sms spoofing [+],
proof of concept [+],
proof [+],
paul mutton [+],
password [+],
mutton [+],
module [+],
manipulation [+],
man in the middle attack [+],
iphone [+],
installation images [+],
installation [+],
image swap [+],
hackaday [+],
graphic manipulation [+],
cross [+],
concept [+],
bug [+],
arbitrary files [+],
android [+],
with [+],
wikileaks [+],
web [+],
visualization [+],
usa [+],
tony hawk [+],
talk [+],
spoof [+],
special ops [+],
signs [+],
security restrictions [+],
security [+],
secunia [+],
script [+],
revou [+],
notifier [+],
news [+],
misc [+],
input [+],
identity [+],
hacker [+],
hack [+],
google [+],
feds [+],
eff [+],
data visualization tools [+],
data visualization tool [+],
data [+],
credential storage [+],
chris sumner [+],
charlie miller [+],
bomb [+],
app [+],
airport [+],
advisory [+],
ExploitsVulnerabilities [+],
zaps [+],
xss [+],
wood [+],
william lindmeier [+],
whisper [+],
website [+],
webapps [+],
wall street [+],
viagra [+],
vending machine [+],
vacuum fluorescent display [+],
user [+],
twitterpassworddecryptor [+],
tweets [+],
trojan [+],
trandi [+],
tip [+],
ticker [+],
thingiverse [+],
than profit [+],
thai prime minister [+],
thai [+],
textsecure [+],
text to speech voices [+],
teletype machine [+],
teletype [+],
telegraph key [+],
telegraph [+],
technical security [+],
supporters [+],
subpoenas [+],
street case [+],
stake [+],
stage [+],
ssl [+],
spine [+],
spam [+],
sophos [+],
solder [+],
software setup [+],
software package [+],
smart phones [+],
shortcut [+],
shop [+],
sheer number [+],
settles [+],
session cookie [+],
session [+],
senator [+],
security flaw [+],
security firm [+],
security breaches [+],
secures [+],
secure [+],
script kiddie [+],
s. subpoenas [+],
ryan ohara [+],
ryan [+],
russian [+],
robots [+],
robot [+],
riots [+],
reveal [+],
resistor [+],
reset [+],
renews [+],
renegotiation [+],
reflow oven [+],
reflow [+],
reddit [+],
reassures [+],
radio [+],
python script [+],
pwns [+],
pwned [+],
publictextbox [+],
prosecutors [+],
privacy project [+],
privacy fight [+],
prime [+],
pranksters [+],
pot [+],
popularity [+],
popular [+],
political protests [+],
political [+],
plugin [+],
picture [+],
phone [+],
phishing [+],
person company [+],
peril [+],
password reset [+],
party apps [+],
oven [+],
open source software [+],
open source [+],
open communication [+],
office [+],
offers [+],
o hara [+],
nucleus [+],
noble has [+],
new york university [+],
new [+],
network attacks [+],
network [+],
nbc news [+],
nbc [+],
muzzle [+],
motorcycle trips [+],
morse code [+],
morse [+],
mood light [+],
mobile [+],
minister [+],
microsoft fixes [+],
microsoft [+],
microcontrollers [+],
messages [+],
mechanical [+],
matt [+],
martin [+],
maps [+],
makes [+],
machine [+],
london riots [+],
london [+],
lol [+],
login credentials [+],
location data [+],
location [+],
local area network [+],
linux box [+],
links [+],
link [+],
lan [+],
lady ada [+],
kiddie [+],
kickstarter [+],
kicked [+],
joker [+],
joke [+],
johnny depp [+],
joel [+],
investigates [+],
internet [+],
interactive telecommunications [+],
instructables [+],
industrial robot [+],
inclusion [+],
https [+],
homeland security [+],
hijacking [+],
heck [+],
heart [+],
hat tip [+],
hat [+],
hands [+],
hand input [+],
hand [+],
hacking [+],
hacked [+],
guts [+],
gps [+],
government [+],
google maps [+],
goodness [+],
gmail [+],
gateway [+],
fun [+],
full disk encryption [+],
ftc [+],
free iphone [+],
followers [+],
flaw [+],
feeder [+],
feed [+],
feature [+],
fbi [+],
excerpt [+],
everyone [+],
entire world [+],
encryption [+],
email [+],
egypt [+],
eavesdropping [+],
dump [+],
drip coffee [+],
dragnet [+],
dispenser [+],
dictionary word [+],
devilry [+],
defend [+],
deep roots [+],
ddos attacks [+],
ddos [+],
day [+],
data requests [+],
dashboard [+],
cybercrims [+],
cybercrime [+],
cuts [+],
csrf [+],
creating web [+],
court orders [+],
court [+],
cooking [+],
control [+],
connections [+],
communications protocol [+],
coffee [+],
clock [+],
clne [+],
classic [+],
chris yerga [+],
chris [+],
chief ronald k [+],
chaos [+],
cellphones [+],
car crash [+],
campaigns [+],
buys [+],
browser [+],
broadcast messages [+],
break [+],
breach [+],
boss [+],
boobie [+],
bonsai [+],
board [+],
blocking [+],
bit [+],
bird feeder [+],
bird [+],
bing maps [+],
bing [+],
beta [+],
beer dispenser [+],
beer [+],
beefs [+],
bbm [+],
bangs [+],
attacker [+],
attack [+],
ashton kutcher [+],
arnold worldwide [+],
apps tab [+],
apple iie [+],
api software [+],
anonymous [+],
andrew armstrong [+],
al gore [+],
ada ice [+],
aclu challenge [+],
aclu [+],
account passwords [+],
account hack [+],
Tools [+],
Pentesting [+],
Countermeasures [+],
3d models [+],
vulnerability [+],
hacks [+]
-
-
16:00
»
SecuriTeam
The Twitter Pull module for Drupal is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
-
-
13:30
»
Hack a Day
This anthropomorphized wood bowl will read Tweets out loud. It was built by [William Lindmeier] as part of his graduate work in the Interactive Telecommunications Program (ITP) at New York University. View the clip after the break to see and hear a list from his Twitter feed read in rather pleasant text-to-speech voices. The electronics involved [...]
-
-
16:00
»
SecuriTeam
The Twitter 5.0 app for the iPhone is vulnerable to eavesdropping via [Man In The Middle][1], this vulnerability can lead an attacker on the same local area network (LAN) to capture and/or modify pictures the victim is seeing on the Twitter app.
-
-
10:22
»
Packet Storm Security Exploits
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
-
10:22
»
Packet Storm Security Recent Files
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
-
10:22
»
Packet Storm Security Misc. Files
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
-
-
6:00
»
Hack a Day
Yeah, it’s like Twitter but actually cool Thingiverse – still the best place on the Internet to find cool 3D models to print out – has gone all Web 3.0 with their new Dashboard feature. Basically, you can think of this as Thingiverse’s version of Twitter. The dashboard allows you to see the latest updates from people [...]
-
-
5:30
»
Carnal0wnage
Geo/Social stalking is fun. Bing maps has the ability to add various "apps" to the map to enhance your bind maps experience. One of the cooler ones is the Twitter Map app which lets you map geotagged tweets.
Let's start with somewhere fun, like the pentagon, and see who's tweeting around there

Once you have your places picked out, you can click on the Map Apps tab.


If you click on the twitter maps app, it loads recent geo-tagged tweets

As you zoom in, you get a bit more detail

You can also follow specific users and follow them around town :-)

thanks to
indi303 for telling me about this
-CG
-
-
7:31
»
Packet Storm Security Advisories
Ubuntu Security Notice 1561-1 - Paul Mutton discovered that ubiquity-slideshow-ubuntu incorrectly handled the Twitter feed displayed during system installation. A remote attacker could use this flaw to inject code into the Twitter feed and read arbitrary files off the filesystem during system installation. This flaw has been resolved in the Ubuntu 12.04.1 LTS installation images by disabling the Twitter feed.
-
7:31
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1561-1 - Paul Mutton discovered that ubiquity-slideshow-ubuntu incorrectly handled the Twitter feed displayed during system installation. A remote attacker could use this flaw to inject code into the Twitter feed and read arbitrary files off the filesystem during system installation. This flaw has been resolved in the Ubuntu 12.04.1 LTS installation images by disabling the Twitter feed.
-
7:31
»
Packet Storm Security Misc. Files
Ubuntu Security Notice 1561-1 - Paul Mutton discovered that ubiquity-slideshow-ubuntu incorrectly handled the Twitter feed displayed during system installation. A remote attacker could use this flaw to inject code into the Twitter feed and read arbitrary files off the filesystem during system installation. This flaw has been resolved in the Ubuntu 12.04.1 LTS installation images by disabling the Twitter feed.
-
-
9:01
»
Hack a Day
Like everyone else, we’re scattered all over the web. We would be silly not to be getting our information out there in as many ways as we can manage. We promise that the site always comes first, but you can also find us on Facebook, G+ (yes, we’re approved this time), twitter, and we even [...]
-
-
13:01
»
Hack a Day
If you ever wanted your name out on the Internet, now is your time to shine. [Chris] hooked up an Arduino to the Internet and is streaming the results of combing through Twitter live to the entire world. The SocialBot9000, as [Chris] calls his build, is an Arduino Uno connected to an Ethernet shield and an LCD [...]
-
-
17:07
»
Packet Storm Security Advisories
Secunia Security Advisory - AppSec has reported a security issue in UberSocial for Twitter for Android, which can be exploited by malicious people to bypass certain security restrictions.
-
17:07
»
Packet Storm Security Advisories
Secunia Security Advisory - AppSec has reported a security issue in TWIDROYD Legacy for Twitter for Android, which can be exploited by malicious people to bypass certain security restrictions.
-
-
5:01
»
Hack a Day
[Joel] of [Helion Microsystems] is at it again with his USB controlled solder reflow oven. You may remember him from his crazy twitter-enabled Ewok model. Although these two projects are quite different, they both use the HU-320 USB breakout board that he’s in the process of getting funding for via [Pozible], or Australian Kickstarter for [...]
-
-
11:01
»
Hack a Day
In the interests of interface archaeology, [Martin] sent in the Tworse Key, a telegraph key that posts to Twitter using Morse code. It’s a fantastic build that nearly looks like something out of the 1900s. We’ve seen a ton of Morse keyboards over the years, but never one so well-engineered for a single purpose. The guts [...]
-
-
7:01
»
Hack a Day
In the interests of open communication in shared spaces, [dan] made a public text box that serves as a terminal to the @publictextbox twitter account. We could see something like this being useful in a hackerspace or other hang out to announce to the world the happenings of the resident makers and builders. The software setup [...]
-
-
10:11
»
Hack a Day
Just about the only thing better than beer is free beer. Staff at the Arnold Worldwide ad agency are free to imbibe in the office’s lounge area, but a few employees thought that it would be pretty awesome to have their beer stash offered up by a vending machine. Using a grant that the company [...]
-
-
8:04
»
Hack a Day
Not content with only knowing the time, [trandi] decided his Vacuum Fluorescent Display clock would be much better if it displayed the weather and a Twitter feed. [trandi] received a Lady Ada Ice Tube clock last month. The kit went together almost too easily. Now he had to, “make it connect to other ‘stuff’ and [...]
-
-
14:06
»
SecDocs
Authors:
Chris Sumner Tags:
intelligence social social engineering Event:
Black Hat USA 2010 Abstract: If you’re ever in a position when you need to pwn criminals via social networks or see where Tony Hawk likes to hide skateboards around the world, this talk is for you. The talk is delivered in two parts, both of which are intended to shine a fun light on visual social network analysis. The first part introduces how you can extend the powerful data visualization tool, Maltego to speed up and automate the data mining and analysis of social networks. I’ll show how I analyzed skateboard legend, Tony Hawk’s twitter hunt and highlight how you could use the same techniques to set up your very own backyard miniature ECHELON. The second part illustrates how these techniques have been used to enumerate a 419 scam, infiltrate the scammers social network and expose deeper, more sinister links to organized crime. I focus specifically on Twitter and Facebook, demonstrating how you can graphically map and analyze social relationships using the Twitter API's, publicly available Facebook profiles, screen scraping and some clunky regex.
-
14:05
»
SecDocs
Authors:
Chris Sumner Tags:
intelligence social social engineering Event:
Black Hat USA 2010 Abstract: If you’re ever in a position when you need to pwn criminals via social networks or see where Tony Hawk likes to hide skateboards around the world, this talk is for you. The talk is delivered in two parts, both of which are intended to shine a fun light on visual social network analysis. The first part introduces how you can extend the powerful data visualization tool, Maltego to speed up and automate the data mining and analysis of social networks. I’ll show how I analyzed skateboard legend, Tony Hawk’s twitter hunt and highlight how you could use the same techniques to set up your very own backyard miniature ECHELON. The second part illustrates how these techniques have been used to enumerate a 419 scam, infiltrate the scammers social network and expose deeper, more sinister links to organized crime. I focus specifically on Twitter and Facebook, demonstrating how you can graphically map and analyze social relationships using the Twitter API's, publicly available Facebook profiles, screen scraping and some clunky regex.
-
-
11:30
»
Hack a Day
The team over at Archonix frequently challenge themselves to create a full working project in under 20 minutes. [Andrew Armstrong] put together a blog post detailing their most recent “Quickproject” – a simple Twitter notifier built using their Boobie Board. They started by putting together a small notifier breakout module that could later be attached [...]
-
-
9:45
»
Hack a Day
If you weren’t aware, Adafruit Industries is sponsoring the “Make it Tweet” contest over at Instructables, and this Twitter-enabled bird feeder is [quasiben’s] entry into the competition. His bird feeder not only sends messages to Twitter, it also sends a picture of each bird to Twitpic. The feeder itself is a standard off the shelf [...]
-
-
4:05
»
Hack a Day
Let’s admit it, you’re just a little bit vain. Heck, we’re all just a little bit vain when you really think about it. Instructables user [pdxnat] was self-absorbed enough that he constructed an LED “mood light” that alerts him each time someone mentions his user name on Twitter. The build is pretty simple, with most [...]
-
-
9:24
»
Hack a Day
Twitter can be a great tool for keeping up to date with your favorite person/company/band/etc. You can find a Twitter client for just about anything that plugs in these days, but sometimes we find that we simply need a break from our computers and smart phones – even if just for a few minutes. What [...]
-
-
10:01
»
Hack a Day
[GuySoft] threw together a cellphone-based SMS gateway that allows him to push text messages to Twitter. Once up and running, it can be used by multiple people, either with shared or individual Twitter accounts. At its core, this setup uses the cellphone as a tethered modem on a Linux box. The open source software package, [...]
-
-
5:00
»
Hack a Day
A fresh pot of coffee is never more than a tweet away with the Tweet-a-Pot. It works in much the same way that our Troll Sniffing Rat does. For that build we used a Python script to monitor our comments, and this does the same except that the script read tweets through the Twitter API. [...]
-
-
5:39
»
Sophos security news
Always choose a hard-to-guess non-dictionary word as your Twitter password, and never use the same password on multiple websites.
-
-
7:10
»
Hack a Day
Remember [Mattythorne]? He took a BMW industrial arm and re-purposed it to write twitter messages on a white board. You can read a small excerpt here. Well [Matt] is back, and as promised includes an entire write up for how he got @scribblebot scribbling twitter messages. It’s a little light on details and we wish [...]
-
-
10:00
»
Hack a Day
[Ryan O'Hara] built a location tracker he could use on motorcycle trips. Ostensibly this is to give his wife piece of mind be we think that was an excuse to play with GPS and SMS. To stand up to the trials of the road [Ryan] took his breadboarded prototype to the next level, using a [...]
-
-
6:47
»
Hack a Day
With the growing popularity of the Android OS for smartphones, it has become a contender for the likes of Apple’s iPhone. With the rise of Android came the facet it revolves around; Open Source. Besides it revolving around being open sourced it also has deep roots with social media. There has been an outbreak of [...]
-
-
17:00
»
Packet Storm Security Advisories
It is impossible to maintain a secure session with Twitter, for multiple reasons. Additionally, once a session has been hijacked, it is possible for the attacker to maintain control over the account (not just the session) indefinitely, unless the user changes their password. This is because the session cookie has the same lifetime as the password.
-
-
7:41
»
Hack a Day
A hand input bootloader and a custom communications protocol are what bring the Apple IIe Twitter ticker to life. [Chris Yerga] bought the decades-old machine for $20 at a flea market. Having just completed his TweetWall he decided to adapt the idea for the 1 MHz machine. He manually input a 50 byte bootloader that [...]
-
-
10:13
»
Hack a Day
The folks from NYC Resistor got their hands on a teletype machine and hacked it to monitor Twitter. This eighty-year-old beast bangs out messages that it receives at 45.45 baud. This isn’t a project that turns something into a teletype, but rather finds a different way to feed the machine data. In this case, a [...]