You are here

The Black Packet - Tech Info Compilations - Hacking Education For Everyone

1 post / 0 new
The Black Packet - Tech Info Compilations - Hacking Education For Everyone

TheBlackPacket Tech Info Torrents are filled with educational materials for the beginning to advanced hacker. If you know nothing about hacking, or are an experienced tech, you should still find very valuable information in these torrents. I am placing this topic here to be updated as new volumes are created. Volume 3 is in the works now! If you have any comments or find the torrent useful, please leave a comment to let us know we are useful!

VOLUME 1: TheBlackPacket - Tech Info - Volume 1 - Hacking Freedom and Safety (ClownSEC)

VOLUME 2: TheBlackPacket - Tech Info - Volume 2 - Hacking The System (ClownSEC)



TheBlackPacket - Tech Info - Volume 1 - Hacking Freedom and Safety (ClownSEC)

This torrent was created to introduce those in the truth community to various forms of hacking. I have hand picked only videos and tutorials which I think will apply to those preparing for tragedy, martial law, large EMP events, and overall survival. Many of the skills found on this DVD could save your life, be useful for hacktivism, or help you setup your own communications network. I focused mostly on talks which were not too technical for those who are not computer programmers, and many in fact do not need the use of a PC (my fav).

Topics include, voting systems, electronic billboards, picking locks, HAM radio, keeping yourself self secure on social networks, survival skills from a hacker perspective, hacking with just your eyes, creating ID's will full security features, police procedure, how constitutional laws apply in the digital age and much more.

See below for complete listing.

01 - Hackers Vs Disasters - Hacker Skills for the Wilderness and Disaster Survival
- Explains the types of disasters you may need to prepare for, the importance of preparing BEFORE they occur. Everything from leaving your house in 5 minutes, to being stuck without electricity for more than 5 hours. This video includes Fire, Shelter, Signaling, Water and more from a hackers perspective.

02 - Personal Disaster Preparedness: Surviving mass EMP events.
- Did you know a single warhead over the USA can take out ALL modern electronics? How do you get out of the building? A giant EMP destroying all electronics and creating fires in some could be triggered by solar flares, nuclear devices, EMP specific weapons etc. Avoid trampling, visibility, finding water, guns, medicines, doctors, avoiding the panic and madness of others.

03 - No Tech Hacking - Hacking without the use of as PC
- You'll hear old familiar terms like "dumpster diving", "social engineering", and "shoulder surfing". Gain info about a person by looking at details such as the type of shoe and wear, taking photos of a PC screen or ID badge etc.

04 - Physical Attacks: Beyond Social Engineering and Dumpster Diving
- Techniques of industrial espionage and physical security, hacking without a computer, and collecting or recording data both video and audio. Examples and methods covered include physically making your way through velectronic locks, numbered keypads, biometric locks, listening to keyboard strokes, listening with lasers, etc. Also relationship based trust, including sex, fake resume's, and display of credentials.

05 - Identification Card Security: Past, Present, Future
- This great presentation covers the REAL ID Act, History of identification cards, Amateur ID Manufacturing, and other High Tech ID concepts. Our reliance on ID, fake ID's, privacy issues, magnetic strips, rfid, etc. Complete demonstration creating an ID with laminate, magstripe, hologram, UV, and where to purchase supplies.

06 - Lockpicking Forensics - How Lockpicking and Locks Work
- Learn the basics of how locks work on the inside. Detailed diagrams explaining how internal mechanisms are designed and how they are defeated. Includes the various tools and methos used to open locks.

07 - Urban Exploration - A Hackers View
- The art of finding entry points into secured or abandoned buildings. Going to floors or areas of buildings nobody else does. Preparing for the exploration of new areas which are possibly rotted, damaged, or otherwise unsafe. Also some great stories and pictures of places these speakers have gone to in their ventures.

08 - Keeping Secret Secrets Secret and Sharing Secret Secrets Secretly
- What is a secret? Why protect a secret? Why sharing secrets may increase secrecy, using encryption, where to store the encryption key, how to eliminate the encryption key, distributing secrets among groups. Hiding data inside images or audio (steganography), detecting hidden data, tools, physically hiding stuff at home and elsewhere.

09 - Everything about Police Procedure in 50 Minutes
- When can the police pull you over? When can they frisk you? How do they determine reasonable suspicion? This talk explains how a cop decides to take interest in your activities. What miranda rights mean to you. when can the police offer frisk you? when can they search your car? knock down your door? Speed traps etc.

10 - Search and Seizure Explained - They Took My Laptop
- A brief outline of the Constitutional laws, privacy, the ammendments and how they are applied to search and siezure. Special focus on the 4th and 5th ammendments this talk describes various methods of search and seizure. Simply being pulled over, scanners and xrays that are found in airports, or confiscation of equipment at the border. Should you use a lock and key or a combination lock? How do emails, snail mail, and phone calls apply? Many examples.

11 - Your Mind: Legal Status, Rights, and Securing Yourself
- Some examples of how the laws are applied to you and your data. Data in various locations may be covered under different laws. Use of encryption, and your level of education may put you in different categories. What if you hide your data in laptops? usb sticks in your pocket? cell phones? websites? computer clouds?
What can be obtained by investigators if they look in your car computers? Prosthetic devices? Does your computer really belong to YOU? What is the best protection? Social Networking, GPS, and more...

12 - Are You Socially Owned in the Cloud?
- Covers social networking and other sites which store your personal data. Including facebook, myspace, youtube, Amazon, itunes, etc. Where does your info go? Who owns it? Can you delete it? What happens when the owner dies?

13 - Social Zombies - Your Friends Want To Eat Your Brains
- Social networks and blogs are the 4th most popular activity on the internet. How do these places make money off of your personal info? Fake profiles and spotting bots. Using facebook to steal personal information or even learn passwords. This talk covers various attacks, disinformation, spam, bots, and other exploits in these websites.

14 - How Can I Pwn Thee? Let Me Count The Ways
- This talk covers several techniques to hack into a system. From wifi hot spots to social engineering random passengers on a flight. Also covers methods to keep yourself safe while travelling, and the most common security risks observed in travellers, and hacking cell phones and bluetooth devices.

15 - Hacking and Playing with Barcodes
- How barcodes work. Learn about how they are used for routing in mail systems, transit systems, tagging of items etc. This video also explains how to make or modify your own barcodes, methods to read them, and how to use your own specially formatted barcodes to hack into systems that are not secure.

16 - Hijacking the Outdoor Digital Billboard Network
- Explains various types of digital billboards in use, the companies who create them. How these billboards work, their security flaws, and tools used to hack into them. Covers both survellience, electronic, physical security, and what not to do when hacking into these billboards.

17 - Death Envelope - Midieval Solution to a 21st Century Problem
- Covers the topic of a "death envelope". What is a death envelope? Who should create one? What should it contain? This covers how to create the envelope, how to update the envelope, combining computers with physical access etc. This information can be as simple as personal account info and passwords, or financial secrets.

18 - HAM for Hackers - Take Back the Airwaves
- Who is experimenting with HAM radio? What frequencies can you use? What can be broadcast? This covers the use of encryption, profanity, licensing, wattage limits, amateur radio, and bandwidth. A great detailed intro into the technology in less than 20 minutes, how to get started, how to utilize the frequencies for experimentation, and HAM radio users dying off.

19 - Climbing Everest - An Insiders Look at One States Voting System
- An insider hired to check the security of Ohios voting system explains how the entire system works, its flaws, and how the technical systems work. Also details of who owns the voting machines, who designed them, and the fact that 80% of all votes are currently being counted on systems made by 2 brothers who own 2 companies?

20 - Mobile Hacker Spaces
- A mobile hacking space put simply is a Van, mobile home, or bus, turned into a meeting space and set up to be ready for classes, talks, wardriving, or just to check email while on a trip/outing. This presentation includes everything you need to get a mobile hacker space up and running, the advantages and disadvantages are discussed.

00 - The Secret History of Hacking
- Explains the beginnings of hacking. Starting with phone hackers or 'phreaks' who could make free phone calls soon taking complete control of the telephone systems. Covers the lives of Captain Crunch, Kevin Mitnick, Steve Wozniak, and several other key hackers. Hackers were once embraced, due to bad press they are now feared.

00 - Web Warriors
- This documentary explains the differences between white hat and black hat hackers. Examples of hacks that have been in the wild including virii, power grid hacks, etc. Hear from professional hackers about how the community works, the motivation for their hobby, and utilizing hacked computers to work as a team against another target.

00 - Revolution OS
- This documentary explains how the free software foundation and GNU was created to ensure users could share free software and source code. This was done as a reaction to Bill Gates and others who were upset about software being shared freely between hackers and hobbiest. This program also explains the origins of the Linux Operating System, Apache Webserver, the Support model, .


TheBlackPacket - Tech Info - Volume 2 - Hacking The System (ClownSEC)

This torrent was created to introduce those in the truth community to various forms of hacking.

Topics include, RFID, WIFI, picking locks, keeping yourself self secure, FOIA,
Data Mining, Physical Weapons, hacking and protecting mobile devices, using game consoles as a hack
station, satellite imagery, hacking the smart grid and parking
meters, Sniffing keys through the power grid, picking electronic locks and more...

See below for complete listing.

00 - How It's Made - Microprocessors, Circuit Boards, Compact Discs, Computers, and more.
- This is a collection of episodes from the show "How It's Made". These episode clips are all
relating to computer
technology and is very useful to understand how all this stuff is made. Ever wonder how those CD's
are made? Your
fiber optics? handheld devices? this goes through the complete manufacturing process. Geek out on
the machines!

00 - Sonic Outlaws
- Within days after the release of NegativlandÆs clever parody of U2 and Casey Kasem, recording
industry giant
Island Records descended upon the band with a battery of lawyers intent on erasing the piece from
the history
of rock music. Craig "Tribulation 99" Baldwin follows this and other intellectual property
controversies across
the contemporary arts scene. This is an excellent documentary covering the topic of Fair Use.

00 - In The Realm of the Hackers
- Australian documentary directed by Kevin Anderson about the prominent hacker community, centered
in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the
Australian teenagers who hacked into some of the most secure computer networks in the world,
including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a
government lab charged with the security of the US nuclear stockpile, and NASA.

01 - Thinking Machines - Creation of the Computer
- Covers the history of the computer, and how the basics of computing works. This is a great
introduction into
the details of a computers past and present. Briefly covers how RAM and CPU's work, various machines
built before
the personal computer, government funding, punch cards, and how these physical machines became the
PC's we use now.

02 - Triumph of the Nerds - Rise of Accidental Empires pt1
- The history of how computers and programming began. The first languages used to help users to
easier program
computers, how the silicon microchips are created, who invented them, and how they were introduced
to the public.
See how the first computer clubs were formed, manual programming concepts, how the first software
was created,
these were the first computer hackers. Includes interviews with Bill Gates, Steve Jobs and other key

03 - Warriors of the Net - How Internet Traffic Works
- A great visual representation of how the internet works. Includes information regarding TCP,UDP,
and ICMP
packets. See how the data travels from when you click a link on the website, leaves your computer,
enters the
private lan, gets routed to other servers, switches, firewalls, and how this is all done to bring
you the internet.

04 - Tactical Exploitation
- A new method of gaining entry into computer systems. Tactics used to size up the system, the
users, the processes,
applications, and existing trust relationships. Target the people, expand the scope of your tests,
and you WILL get in.
Some examples of great utilities and tools used to break into networks or collect data about the
systems and people.

05 - Dangerous Minds - The Art of Guerrilla Data Mining
- This presentation explains how huge amounts of information collected in the wild such as GPS,
emails, chat
logs, search results, bank statements etc. can be looked at by a computer to gain intelligence. How
does the
government find increase chatter over a specific topic? How do they eliminate false positives like
popular news
stories, or current events which cause natural increases in chatter. Find out how they find criminal

06 - Boomstick Fu - The Fundamentals of Physical Security
- This covers defensive weapon ownership. How to stay within the law and keeping your hardware
legal. Rules
for keeping your guns safe, how to hold your gun, why you should own a gun, and preparing for the
worst case.
What kind of gun should you buy? Autoloading vs Pump? Shotgun vs Handgun? Ammo? Stun Guns? Tasers?
Pepper Spray?

07 - Biometric and Token Based Access Control
- Examples of various biometric systems and attacks. A demo showing how to attack the system.
Complete diagrams
of how these systems work and the various components. Cover mag stripe cards, proximity cards,
concealed barcodes,
smart cards, and other systems. Also covers eye scans, hand scans, fingerprint scans, and how they
are defeated.

08 - Penetration Testing WIFI Networks
- Aaron Peterson speak about WIFI networks and its inherent flaws. A full rundown on penetration
testing and
searching for security flaws, how wifi scanning works, the difficulties and common tools for
breaking security.

09 - How To Be A WIFI Ninja
- This presentation covers everything you need to know to become a WIFI ninja. How to go through
examples of devices using this technology, the frequencies used and technical details of the
technology. This
talk is mostly about setting up WIFI networks with great distance, and understanding the underlying

10 - Shifting the Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key
- This lecture covers some more complex attacks on WIFI networks. While many people are still using
WEP, this
insecure protocol is slowly being replaced. This video explains some of the technologies and how
they too can
be attacked and the traffic 'sniffed'. Software tools are discussed and examples given to better

11 - WiFish Finder - Who Will Bite The Bait
- This is a very short presentation explaining the security problems in over 50% of all computers
wifi. Live
demonstrations are given showing hwo much info is obtained by members of the audience. Full
encryption types,
ESSID's, locations, and other information is immediately found as your computer sends this data to
anyone looking.

12 - Attacks Against 2Wire Residential Gateway Routers
- These are the most common routers on the market today for DSL users. This talk explains some of
the ways that
these systems can be hacked. Goes over the default passwords, default admin pages and settings, and
other useful info.

13 - Hacking IRAQ
- This presentation covers the security and infrastructure in IRAQ. Cellphone's, Internet, Land
Lines, and other
communications are covered. Also covers the IED devices, triggering systems, and how they are
created or categorized.

14 - Picking Electronic Locks
- A brief explanation of how electronic lock systems work and how they can be defeated. Covers
various components
and attack points in the system. How TCP sequence prediction and other 'old hacks' can be used in
these new systems.

15 - Hacking with the iPod Touch/Iphone/Ipad
- Complete guide to using a mobile 'i' device as a hacking platform. Learn how to hack your iphone
first, then
which software to install, and finally examples if scanning targets and running exploits on a victim

16 - Is Your Phone PWNED? Auditing, Attacking, and Defending Mobile Devices.
- This talk explains various methods of hacking mobile phones. Some real world examples and
demonstrations are
done to show it in action. Covers technologies like wifi and bluetooth which are standard in most
new phones.

17 - Sniffing Keystrokes with Lasers and Voltmeters
- What is tempest? Explanation of emissions and electro magnetic pulses utilized in keyboard, and
display devices
and how to read or use this information without detection. See what someone is typing in the room
next to you by
simply plugging into the electrical outlet and measuring the leakage into the power grid.

18 - Hacking the Smart Grid Power System
- Full white paper and video explaining how the new SMART power grid system works and its
weaknesses. This includes
everything from privacy concerns, to leeching free power. This new system is flawed by design and
now being implemented.

19 - Hacking the Smart Parking Meter
- This talk explains the various hardware of 'smart' parking meters, ports for access, and the
Various meters are covered mostly in use in the Bay Area of California. Understand how the security
of these
devices work, how money is collected, smart cards, and how to get your own meter to play with. This
is a great
example of how a hack is done from the ground up. Great blueprint/methodology for your own hardware
hacking projects.

20 - The Science of Social Engineering
- Hypnosis, NLP, and the science of persuasion. This talk has many examples of how the brain works
and which choices
they make when put into the situation. The power of influence from others, the power of trust etc.
Great talk
for aspiring social engineers, how the buffer overflow and other hacker tactics work on the brain.

21 - Satellite Imagery Analysis
- What are the good and bad uses of satellite images? What things have been caught with imaging from
google maps?
How were the first aerial shots taken? Did you know UV and Heat can be viewed through satellite
imaging? Also covers
various ways to sample the images, design considerations for sensors, collecting data and putting it
to use.

22 - Thinking Outside of the Console
- How to use game console to gain access to a network. How these consoles can be hidden and attract
little suspicion.
The art of covert pentesting, performing security analysis on a network undetected using modified
video game systems.
Covers the various game consoles such as xbox, playstation, nintendo wii, and the internal hardware.

23 - RFID Mythbusting
- The purpose of this lecture is to demonstrate the insecurity of RFID devices and cards. Chris
shows his custom
reading device built out of off the shelf components, explains how to build and obtain reader
devices, the incredible
distance at which these tags can be read, and other security problems with the encryption and

24 - High Insecurity - Locks, Lies, and Liability
- Special talk relating to high security locks and how they work. Demonstrations of engineering
problems and methods
to bypass the locking mechanisms. Various security methods are analyzed such as drill proof locks,
sawing, and pulling.
Lots of info on this one as its nearly 2 hours long, some great footage breaking high security locks


Please leave comments for suggestions, complaints, recommendations etc. to let us know you care!

and for more free online streaming documentaries check out