Lost+Found: Photo glitch, a wardriving bike, radio problems
Too short for news, too good to lose; Lost+Found is a roundup of useful and interesting security news. In this edition: a revealing UK MOD photo, a custom wardriving motorcycle, libraries for reverse engineering, exploit toolkits, and radio troubles.
- Access credentials used to log into the UK Ministry of Defence's (MOD) Military Flight Information Publications (MilFLIP) have been published online. The information wasn't accessed by hacktivists, but was instead revealed in a series of photographs taken of Prince William at work.
- Denis Andzakovic has two jobs: penetration testing for his security consultancy and as a custom motorcycle shop co-founder. He recently combined the two to build a custom Wi-Fi wardriving bike.
- The Python arsenal for reverse engineering delivers exactly what its name promises: custom Python libraries to disassemble binaries.
- Exploit toolkits such as Black Hole probe computers for a wide variety of known vulnerabilities in applications. An overview of these can be found in a blog post. You can even order a 2012 Common Exploit Kits poster for your office.
- The US Department of Homeland Security (DHS) spent more than $430 million dollars over the past nine years to buy special radios tuned to a custom, secure channel. According to an internal investigation, however, only one in 479 DHS employes actually knew how to use them.