Difference between pages "TDMA" and "Hash (tool)"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
m
 
Line 1: Line 1:
'''TDMA - Time Division Multiple Access'''
+
{{Expand}}
 +
{{Infobox_Software |
 +
  name = Hash |
 +
  maintainer = [[The Grugq]] |
 +
  os = {{Linux}} |
 +
  genre =  |
 +
  license =  |
 +
  website = [http://www.tacticalvoip.com/ tacticalvoip.com] |
 +
}}
  
TDMA (Time Division Multiple Access), has the largest network in the US.
+
===Background===
  
TDMA is a digital wireless communication method allowing many users to access a single radio frequency without interference.  Every individual user is given a unique time slot within each channel.
+
Hash ('''Ha'''cker '''She'''ll) is a tool to enable people to evade detection while penetrating a system.
  
Why use TDMA?  IT increases the efficiency of transmission and offers a number of other advantages.  A major pro is it can be easily adapted to transmission of data as well as voice communication.  It offers the ability to carry date rates of 64 kbps to 120 mbps, which enables options of communication such as fax, voiceband data, sms, as well as bandwidth intensive apps. TDMA allows the user to have extended battery life since the mobile is only transmitting a portion of the time during conversations.  Furthermore, it is the most cost effective technology for upgrading a current analog system to digital.
+
Hash, originally written in 2003, was re-written in June 2007 and released at the Korean security conference, [http://www.powerofcommunity.net Power of Community] that November.
  
How it works:
+
===Features===
It’s necessary for TDMA to rely upon that fact that the audio signal has been digitized.  These signals are divided into a number of milliseconds.  TDMA is also the access technique used in the European digital standard, GSM, and the Japanese digital standard, personal digital cellular (PDC). The reason for choosing TDMA for all these standards was that it enables some vital features for system operation in an advanced cellular or PCS environment. Today, TDMA is an available, well-proven technique in commercial operation in many systems.
+
A single channel can carry all four conversations if each conversation is divided into relatively short fragments, is assigned a time slot, and is transmitted in synchronized timed. 
+
  
Pros & Downfaults:
+
'''Hacking utilities'''
TDMA can be wasteful of bandwidth because time slots are allocated to specific conversations whether or not anyone was speaking at the given moment.  There is an enhanced version however, EDTMA, which attempts to correct this problem.  Unlike TDMA which waits to determine whether a subscriber is transmitting, ETDMA assigns subscribers using a dynamic method.  The data is sent through pauses which normal speech contains.  If the subscriber has something they would like to transmit, it is placed as one bit in the buffer queue.  The system then scans the buffer and notices the user has something to transmit, allocating the bandwidth accordingly.  However, if there is nothing to transmit, it goes to the next subscriber.  This technique can be 10 times more efficient as analog transmission of TDMA. 
+
* Inline file transfer
 +
* qondom - remote diskless execution
  
Cell Phone Providers:
+
'''Builtins'''
There are several cell phone companies competing to sell their phones and advertise their network coverage area.  They will primarily be competing within two categories:  TDMA and CDMA.  The pros and cons of TDMA have been mentioned, and the companies that offer TDMA are the following:  AT&T, Cingular, Nextel, T-Mobile.  The companies that support CDMA are:  ALLTEL, Amp'd Mobile, Cricket Wireless, ESPN, Quest, Sprint, Verizon, Virgin Mobile.  As we can see, more companies are supporting CDMA.  The question that arises is, what makes the two so different.  TDMA is better for international plans and debately has better battery life.  CDMA claims it has better battery life and coverage, however, Cingular is supposed to have the best coverage area and that is TDMA. 
+
* Triggers
 +
* Aliasing
 +
* Basic file system and shell escape commands
  
 +
===External Links===
 +
* [http://powerofcommunity.net/poc2007/grugq.pdf PoC presentation: ''Hacking Sucks!'']
 +
* [http://www.tacticalvoip.com/tools.html hash-0.2.5.tar.gz]
  
 
+
[[Category:Anti-forensics tools]]
 
+
'''References'''
+
 
+
[http://en.wikipedia.org/wiki/Time_division_multiple_access TDMA]
+

Latest revision as of 14:17, 1 September 2009

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Hash
Maintainer: The Grugq
OS: Linux
Genre:
License:
Website: tacticalvoip.com

Background

Hash (Hacker Shell) is a tool to enable people to evade detection while penetrating a system.

Hash, originally written in 2003, was re-written in June 2007 and released at the Korean security conference, Power of Community that November.

Features

Hacking utilities

  • Inline file transfer
  • qondom - remote diskless execution

Builtins

  • Triggers
  • Aliasing
  • Basic file system and shell escape commands

External Links