Biohack your Brain Cells and Human Body

This ebook provides an introduction to the world of biohacking. What is biohacking? In the hacking culture, biohacking is the use of science and technology that an individual can use to improve or optimize the functionality of his/her body and brain; to put it another way, biohacking uses biology research and physical experiments with technology and/or nootropics to optimize how our body and brain works with the environment that is around us.

In the biohacking world, there is a sub-field that is called body-hacking or biohacking grinding, and those who practice the techniques of body-hacking are known as grinders. What is biohacking grinding? In the hacking culture, it is the use of cybernetic devices that an individual can use to improve or optimize the functionality of his/her body and brain. For example, if a hacker wants to monitor his/her health conditions, he/she can use an electronic tattoo to monitor his/her heart rate. Another example, an individual may use a crypto implant to transfer cryptocurrencies or buy some products.

Download

Disclaimer: This is not medical advice. This information comes from a human being who wants to share knowledge with other individuals; however, as previously stated, the information that you can see on this website or ebook is not medical advice.

Author: Socket_0x03
Date: 02/10/2021

Hacking RFID Implants

One of the best ways to protect ourselves from different kinds of cybernetic attacks is learning about some of the most common vulnerabilities that an attacker can exploit in a technological implant; therefore, in this biohacking blog, we will learn some of the most common techniques that an individual can use to exploit vulnerabilities in an RFID implant.

RFID Attacks:
1. Physical Layer: 
   1.1 KILL Command
   1.2 Relay attacks
2. Network Transport Layer: 
   2.1 Cloning
   2.2 Spoofing
   2.3 Eavesdropping
3. Application Layer:
   3.1 Web-App Vulnerabilities
    3.1.1 SQL Injections
    3.1.2 Cross-Site Scripting (XSS)
   3.2 Memory Vulnerabilities
    3.2.1 Stack Overflows
    3.2.2 Heap Overflows

1.1 KILL Command: When a hacker wants to destroy an RFID chip, he/she can use a command that is known as the Kill command. Originally, the Kill command was build as a security measure to protect sensitive files, such as those sensitive files that are stored on a company database; however, as previously stated, an individual with malicious intent could use the Kill command to destroy an RFID chip or RFID tag.

Author: Socket_0x03
Date: 02/09/2021