यह ब्लॉग खोजें

Live News

गुरुवार, दिसंबर 17, 2009

Skygrabber Review | What is Skygrabber? | U.S. Drones Hacked via SkyGrabber

SkyGrabber is a offline satellite internet downloader. Skygrabber intercepts satellite data including movie, music, pictures etc that downloaded by other users and saves information in your hard disk.

Skygrabber could hack the unmanned planes because those planes have unprotected communication link. A brief review look shows that SkyGrabber is created by a Russian company.

Wanna Try Out SkyGrabber, Download Skygrabber here.

The most common phenomenon of SkyGrabber is that you can download anything even without using the Internet.

Skygrabber is widely available for under $30 from a number of different sources. 

Senior defense and intelligence officials said Iranian-backed insurgents intercepted the video feeds by taking advantage of an unprotected communications link in some of the remotely flown planes' systems. Shiite fighters in Iraq used software programs such as SkyGrabber -- available for as little as $25.95 on the Internet -- to regularly capture drone video feeds, according to a person familiar with reports on the matter.

The software doesn't require an online internet connection. The user just needs to customize the satellite dish for selected satellite provider and start grabbing the data packets.

SkyGrabber works on Satellite internet, which is mainly used in remote areas or in areas where Internet access is not smooth due to slow speed and high cost of local Internet connections. In such a set up responses to the requests come from the satellite. The data is accepted by all who are in the satellite coverage area. The SkyGrabber intercepts data of other users, assorts them into files and saves the files in hard drive.

Key Features of SkyGrabber

* Filtering information by the types of files ( mp3, avi, mpg )
* Filtering information by IP, MAC addresses
* Simultaneous work on the Internet and grabbing
* The monitoring system resources
* Showing progress downloads
* Handling TCP, GPE, IP, MPE package
* Handling HTTP responses (200, 206)
* Support Kazza, Gnutella
* Support dreamboxes

This would mean a blotch on US military that boasts with a superior digital-age technology.
The cause of security breach was explained by Declan McCullagh in a note
This apparent security breach, which had been known in military and intelligence circles to be possible, arose because the Predator unmanned aerial vehicles do not use encryption in the final link to their operators on the ground. (By contrast, every time you log on to a bank or credit card Web site, or make a phone call on most modern cellular networks, your communications are protected by encryption technology.)

कोई टिप्पणी नहीं:

एक टिप्पणी भेजें


Back To Top