Women Behind Bars – Rose and Celeste

Women Behind Bars - Season 1, Episode 3 - Rose and Celeste

A woman who was convicted of murdering her lover while in a drug induced fight and a woman who killed her grandmother are featured. Women Behind Bars provides an in-depth profile of the lives of incarcerated women. The show delves deep into their stories of how and why they committed their crimes. Each woman has a unique story to tell. From cold-blooded murder to crimes of passion, these jaw-dropping stories will shed light on the most awful side of human nature and the frightening world behind prison walls. As seen on WE tv.

WillC – Phreaking Elevators – DEF CON 27 Conference

WillC - Phreaking Elevators - DEF CON 27 Conference

This is a comprehensive dive into the current emergency phones with an in-depth look at the phones used in elevators. This talk will provide unique insight into a topic that hasn’t been covered before: Elevator Phones. During this talk, I will discuss the commonality between elevator phone brands. I will cover a new, never before released, set of default passwords these system use. I will show a tool kit and how to use it to access elevator phones locally, as well as remotely. In addition, I will show how to reprogram a phone , how to make the elevator state …

Read moreWillC – Phreaking Elevators – DEF CON 27 Conference

Death Row : Inside Indiana State Prison

Double Murder at 13 | Death Row : Inside Indiana State Prison | Ep. 1 | Real Crime

Sir Trevor MacDonald ventures into one of America’s most infamous prison. There he comes face to face with the men on death row to find out what it’s like to live under the looming shadow of their final day. On this first part we meet an inmate that was able to escape the death row, see the prison barber shop where prisoners have a rare glimpse of normal life, and we meet a bright young man in death row due to a grave mistake he made at 13.

How to crack password using Hashcat

how to crack password using hashcat | crack password | hashcat

This video tell you about the password cracking using hashcat. crack any kind of password’s hash in just few seconds by the using of hashcat tool. This video tells all the basics of password cracking with step by step explanation… link for download the hashcat tool ——- https://hashcat.net/hashcat/ link for centos installation—— https://youtu.be/Ei7E7eKkNBM link for install vm ware tools—– https://youtu.be/13pwPgjiJT0

Pedro Alonso Lopez (Monster of the Andes)

Pedro Alonso Lopez (Monster of the Andes) Serial Killer Documentary - The Best Documentary Ever

Pedro Alonso López (born 8 1948 in Santa Isabel, Colombia) is a Colombian-born confessed serial killer, accused of raping and killing more than 300 . Pedro Alonso Lopez is a child-murderer and rapist, known as The Monster of the Andes. He targeted young girls, between the ages of 8 and 12. Arrested in . Pedro Alonso López (born 8 1948 in Santa Isabel, Colombia), also known as the Monster of the Andes, is a Colombian-born confessed serial killer, .

PASTA: Password-based Threshold Authentication

PASTA: PASsword-based Threshold Authentication

We introduce and formalize a new notion of password-based threshold token authentication, which protects password-based authentication against single point of failures. Specifically, we distribute the role of a single server among n servers and allow any t servers to collectively verify clients’ passwords and generate tokens, while no t-1 servers can forge a valid token or mount offline dictionary attacks. We then introduce PASTA, a general framework wherein clients can sign on using a two-round (optimal) protocol that meets our strong security guarantees. Our experiments show that the overhead of protecting secrets and credentials against breaches in PASTA, i.e. compared …

Read morePASTA: Password-based Threshold Authentication

Mapping the Wireless IOT

Let's See What's Out There - Mapping the Wireless IOT

by Tobias Zillner “Radio… The final IoT frontier. These are the problems of penetration testers. Our continuing mission: To explore strange new signals… To seek out new devices; new protocols… To boldly detect what no one is aware of!” The Internet of Things (IoT) is considered to be the next phase of the Internet revolution – linking more and more objects of the real world to the virtual world and enabling anytime, anyplace and anything communication. Due to the vast increase in popularity and distribution, the IoT has become an interesting target for attackers. Because it is becoming more and …

Read moreMapping the Wireless IOT