Posts

Showing posts from August, 2017
Image

CLASSIFICATION OF COLLOIDS

Comparisons of multimolecular, macromolecular and associated colloids are as follows: MULTIMOLECULAR COLLOIDS MACROMOLECULAR COLLOIDS ACCOCIATED COLLOIDS They are formed by the aggregate of a large number of atoms or molecules which generally have diameters less than 1nm, e.g. Sols of gold, sulpher etc. They are molecules of large size e.g. polymers like rubber, nylon, starch. They are formed by of aggregation of a large number of ions in concentrated solution e.g. soap sol. Their molecular masses are not very high. They have high molecular masses. Their molecular masses are generally high. Their atoms or molecules are held together by weak vander Waal’s forces. Due to long chain, the vander Waal’s forces holding them are comparatively stronger. Higher is the concentration; greater are the vander Waal’s forces. They usually have lyophilic character. They usually have lyophobic character. Their molecules contain both lyophobic and lyophilic ch...

HOW TO BUILD YOUR OWN BAD USB

Image
Make Your Own Bad USB Introduction Most common USB flash drives are exploitable due to the "BadUSB" vulnerability. This allows us hackers to reprogram the microcontroller in them to act as a human interface device (HID), e.g., a keyboard, and perform custom keystrokes on our target machine. This scenario is often called an "HID Payload Attack," since you have to hand over your script to the Bad USB for the execution (more on that later). Even though almost every USB flash drive is exploitable, the only released reprogramming method is for "Phison" microcontrollers. In this tutorial, we are going to determine the microcontroller of your USB flash drive, compile the source code published in GitHub for the tools we need, and move over to building a custom firmware with an embedded HID payload that will turn our harmless USB flash drive into a malicious keyboard designed to help us compromise our victim machine. The process is kind of like compiling a...