Categories

Archive for the ‘security’ Category

Video: PwnDrone The Modern Airborne Cyber Threat

Sunday, June 21st, 2015

In this presentation from the recent BSides Cleveland conference, Devin Gergen explains the basics of UAVs including their history, capabilities and potential. This video is available due to the tireless efforts of Irongeek.

Tags: , ,
Posted in security, surveillance, Videos | No Comments »

Video: Wireless Intrusion Detection System with Raspberry Pi

Monday, June 15th, 2015

Chris Jenks presented at this weekend's Circle City Con in Indianapolis, IN. Chris is a graduate from Eastern Michigan University with a Bachelor of Science in Information Assurance. He works full time doing security audits, firewall design, network consulting, and troubleshooting. His Raspberry Pi WIDs was published in the Linux...

Tags: ,
Posted in Linux, R-Pi, security, Videos | 2 Comments »

Video: Electronic safe vulnerabilities

Monday, March 30th, 2015

Think electronic safes are fail safe? Here's a video by Jeff Popio, Sr. Security Architect for Stealth Entry LLC, demonstrating an electronic safe fail and highlighting the vulnerabilities of these units. This talk was presented at the Central Ohio Infosec Summit held last February. Video courtesy of Irongeek.

Tags: ,
Posted in hacks, security | 2 Comments »

Homebrew wireless security system

Monday, February 2nd, 2015

In a previous post we covered the security node that Ken from OverEngineered was building to replace the proprietary home security system in his house. Ken has updated us on the project's status. "I finally got the final version of that node installed and running my home's security system. It's...

Tags: ,
Posted in code, DIY, open source, security, wireless | 1 Comment »

Open source Android IMSI-Catcher Detector

Friday, January 9th, 2015

The crew from SecUpwN wrote in to tell us about their free and open source project to detect IMSI-Catchers and Silent SMS attacks with your Android smartphone: The Android IMSI-Catcher Detector Starting out on XDA Developers, our small team and me has been working on an open-source security-related Android App since the...

Tags: , ,
Posted in security | 2 Comments »

Reverse engineering a Verisure wireless alarm

Tuesday, December 9th, 2014

Here's an informative two-part series of posts over at FunOverIP detailing how to reverse engineer a Verisure wireless alarm. Part 1 details the beginning steps such as finding the modules radio frequency and modulation type, analyzing the chipset datasheet and using GNU Radio.

Tags: , ,
Posted in reversed, RF, SDR, security, sensors, wireless | 2 Comments »

Password manager

Monday, November 24th, 2014

Sjaak posted pictures of his password manager build in the project log forum: I was frustrated by trying to remember my passwords for all my websites and got even more frustrated when i need to change a password again after some months. Dont even to mention the needed complexity of them nowadays....

Tags: ,
Posted in project logs, security | 1 Comment »

Demystifying hardware security with the Bus Pirate

Wednesday, November 12th, 2014

Alain Iamburg over at FishNet Security writes: Welcome to Part III of this series on hardware security. In Part II we explored passive data captures of EEPROM read operations over the SPI bus. In this installment, we will be looking at techniques for actively probing and communicating with such chips. Memory...

Tags: , ,
Posted in Bus Pirate, security | No Comments »

Mooltipass, an open source offline password keeper

Thursday, November 6th, 2014

Password keeper for all platforms and devices on Indiegogo, the Mooltipass: The Mooltipass is an open source offline password keeper, a project that started a little less than a year ago. Dozens of contributors from all over the globe got together to work on this device that offers significant advantages over...

Tags:
Posted in open source, security | 6 Comments »

Derbycon video: Making BadUSB Work For You

Thursday, October 2nd, 2014

Adam Caudill and Brandon Wilson gave this presentation at the recent Derbycon 2014 conference in Louisville, KY, covering their hack of the Phison 2251-03 USB controller firmware to add new "features" and functionality. They focus on the Patriot Supersonic Xpress 8GB USB drive allowing it to be repurposed for non-standard...

Tags: ,
Posted in hacks, reversed, security, USB, Videos | No Comments »

Monitoring Android traffic with Wireshark

Tuesday, August 26th, 2014

Ever wonder what data is being sent out by your Android device? Here's a post from LinuxJournal outlining how to monitor your device's WiFi traffic. The technique involves setting up a man-in-the-middle Wireless Access Point (WAP) on your Ubuntu Linux box, then connecting your Android device via WiFi to this...

Tags: , ,
Posted in Android, Linux, security, software, techniques | No Comments »

DEFCON 22: WarKitteh – cat on the warprowl

Thursday, August 21st, 2014

Why do the wardriving yourself when your cat can do it for you? Gene Bransfield gave this presentation at the recent DEFCON 22 conference, describing his efforts to use domestic pets wearing WiFi sniffer/GPS logging gear to essentially warprowl for WiFi hotspots. There's also DoSdog, a standard pooch wearing a...

Tags: , , , , ,
Posted in conferences, hacks, security, Videos, wireless | No Comments »

PIR sensor

Thursday, August 14th, 2014

An automatic PIR sensor project by Rajkumar Sharma of Electronics Lab: Project is based on Holtek’s IC HT7610A, which is a CMOS LSI chip designed for use in automatic PIR lamp, flash or buzzer control. It can operate in 3-wire configuration for relay applications. In our project we have used relay instead...

Tags: , ,
Posted in security, sensors | No Comments »

At HOPE, EFF releases code for Open Wireless router

Monday, July 28th, 2014

At last weekend's HOPE Conference in New York City, the EFF released the code for their experimental hacker alpha wireless router software specifically designed to support secure, shareable Open Wireless networks. We are offering this hacker alpha release to engage enthusiastic technical users who would like to help us test,...

Tags: , , , ,
Posted in News, security | No Comments »

Linux security tip: moving your /boot partition to removable media

Monday, June 30th, 2014

Today threats to your data can come from many quadrants. It's not enough to protect against malicious online attacks; there's the very real threat of government confiscating and examining the electronic devices carried by international travelers, and even planting spyware. In this post from "The Doctor", we're shown one way...

Tags: ,
Posted in how-to, Linux, security, USB | 2 Comments »

Hacking the Java Debug Wire Protocol (JDWP)

Wednesday, June 11th, 2014

Christophe Alladoum has posted a tutorial on the IO Active Labs Research blog on the Java debug wire protocol and its insecurities. He explains, "In this post, I will explain the Java Debug Wire Protocol (JDWP) and why it is interesting from a pentester’s point of view. I will cover...

Tags: , , ,
Posted in code, reversed, security, tutorials | No Comments »

DARPA looks to Oculus as a cyberwar weapon

Sunday, May 25th, 2014

The Oculus Rift is a high end virtual reality headset being developed for gamers. A team from DARPA has announced that they are working toward integrating the Oculus's virtual cybervision capabilities into the cyberwar arena. The US armed forces’ far-out research branch known as the Defense Advanced Research Projects Agency...

Tags: , ,
Posted in News, security, surveillance | 2 Comments »

Defcon 21: secret life of SIM cards

Friday, May 2nd, 2014

PHd student Karl Koscher and software engineer Eric Butler have teamed up to research phone SIM cards and how they are used to run small apps. At the DEFCON 21 conference they presented their methodology and results. "This talk, based on our experience building SIM apps for the Toorcamp GSM...

Tags: ,
Posted in reversed, security, Videos | No Comments »

Shmoocon 2014: vehicle infotainment data forensics

Wednesday, April 30th, 2014

Courtney Lancaster gave this talk at Shmoocon 2014 outlining the types of information available from vehicle infotainment systems "This talk will take an in-depth look at infotainment technologies and how to forensically acquire the data associated with the functionalities that exist across various manufacturers. Furthermore, we will cover the challenges...

Tags: , , ,
Posted in security, techniques, Videos | 1 Comment »

30c3 video: hacking RFID public access control systems

Sunday, April 20th, 2014

In this video from the 30th Chaos Communications Congress, Adrian Dabrowski lectured on RFID based access control systems which are becoming common in Europe. These systems debuted in 2006 and use RFID cards as a substitute for a previous mechanical key system to allow emergency service, delivery and other personnel...

Tags: ,
Posted in hacks, RFID, security, Videos | No Comments »

Next Page »

Recent Comments

  • coppice: If all you have found so far is fake iphones, the next place you should visit is SEG in Hua Qiang Bei. Get out of...
  • Edward Cooper: Great article and good find on the markets! Any chance you can provide the locations of these places? I'm in Shenzhen at the moment and...
  • Dan: I'm up for one
  • TrickyNekro: Always in for another bunch! :-D
  • mol-1: Maybe this time !