Posts Tagged ‘DEFCON 20’

DEFCON 20 video: DIY electric car

Friday, May 31st, 2013

In this talk from DEFCON 20, IT security professional and robotics enthusiast Dave Brown presents his thoughts on the DIY electric car. Dave's views result from his experience designing and building his "Voltswagon", a retrofitted 1974 Volkswagen Beetle. The PDF of the presentation slides should be available soon in the...

Tags: ,
Posted in DIY, Videos | No Comments »

DEFCON 20: RenderMan on ADS-B aero radio

Thursday, February 28th, 2013

Brad Haines (RenderMan) CISSP, is a Whitehat by trade, Blackhat by fashion, who presented this talk at DEFCON 20. For those of you unfamiliar with him, RenderMan has a history of hacking RF who's rumored to be a member of the Church of WiFi. In this presentation he turns his...

Tags: ,
Posted in digital radio data, RF, Videos | 3 Comments »

DEFCON 20: SIGINT and traffic analysis for the rest of us

Wednesday, January 9th, 2013

[embed][/embed] At last Summer's DEFCON 20 conference Sandy Clark and Matt Blaze from the University of Pennsylvania discussed their research into the security of the P25 (APCO Project 25) digital radio protocol. Here they explain the basics of the P25 protocol and examine some of the problems and flaws they...

Tags: ,
Posted in digital radio data, RF, security, Videos | 2 Comments »

DEFCON 20 – NFC Hacking: The Easy Way

Sunday, December 23rd, 2012

Eddie Lee, a security researcher at Blackwing Intelligence, gave this presentation at last Summer's DEFCON 20 conference. His technique involves using NFCProxy, an open source software tool released at the conference to analyze 13.56 MHz RFID protocols and proxy transactions using Android phones. NFCProxy can view the wireless transmissions from...

Tags: ,
Posted in open source, RF, software, Videos, wireless | No Comments »

Official DEFCON 20 badges on sale

Friday, December 7th, 2012

A limited number of DEFCON 20 "Human" badges are available from HackerStickers. The badges, described in an earlier post, are essentially a Parallax Propeller dev board and are being offered for $40 (plus shipping.) Each badge comes with 6 batteries, 2 PS/2 connectors, and 1 VGA Connector. These are the...

Tags: ,
Posted in Parallax Propeller | 1 Comment »

Bus Pirate in DEFCON 20 presentation

Friday, November 30th, 2012

[embed][/embed] S3c writes to inform us that the Bus Pirate got a mention in DEFCON 20 talk on reversing smart meters. From what we were able to ascertain from the video the Bus Pirate is used to read memory devices located on the smart meter boards. Via the contact form....

Tags: ,
Posted in Bus Pirate, security, talks | No Comments »

Try hacking your own Defcon 20 badge mockup

Saturday, September 22nd, 2012

If you didn't get to DEFCON 20 this year you can still try you hand at badge hacking. This year's badge featured the Parallax Propeller chip and they've now released essential files that allow you to create your own functional replica badge. Links have been provided for the schematic, firmware,...

Tags: ,
Posted in code, documentation, hacks, Parallax Propeller | No Comments »

DEFCON 20: Hacking smart meters

Wednesday, August 22nd, 2012

At the recent DEFCON 20 conference in Las Vegas, Don C. Weber presented this talk on smart meter technology and security. The presentation deals with the optical port found on smart meters, and covers attacks from quick memory acquisition techniques to more complex hardware bus sniffing, as well as how...

Tags: ,
Posted in Bus Pirate, hacks, measurement, security, talks, wireless | 2 Comments »

Recent Comments

  • Joe Desbonnet: Ya, I can recommend the low melting point solder. I used brand 'ChipQuik' and it's amazingly easy to use.
  • Jerome: I need a new BusPirate for the Fablab ;) Many thanks!
  • Max: Seems like an unexpectedly violent way to remove the chip indeed. A hot air station should of course do the job just fine, but in...
  • jose: Part removal described here is pure butchery, the cheapest hot air station will do a fast and clean job removing the QFP, heat air to...
  • Cody: Yes please