Category Archives: security

Reverse engineering a Verisure wireless alarm

Here’s an informative two-part series of posts over at FunOverIP detailing how to reverse engineer a Verisure wireless alarm. Part 1 details the beginning steps such as finding the modules radio frequency and modulation type, analyzing the chipset datasheet and … Read more

Derbycon video: Making BadUSB Work For You

Adam Caudill and Brandon Wilson gave this presentation at the recent Derbycon 2014 conference in Louisville, KY, covering their hack of the Phison 2251-03 USB controller firmware to add new “features” and functionality. They focus on the Patriot Supersonic Xpress … Read more

Monitoring Android traffic with Wireshark

Ever wonder what data is being sent out by your Android device? Here’s a post from LinuxJournal outlining how to monitor your device’s WiFi traffic. The technique involves setting up a man-in-the-middle Wireless Access Point (WAP) on your Ubuntu Linux … Read more

DEFCON 22: WarKitteh – cat on the warprowl

Why do the wardriving yourself when your cat can do it for you? Gene Bransfield gave this presentation at the recent DEFCON 22 conference, describing his efforts to use domestic pets wearing WiFi sniffer/GPS logging gear to essentially warprowl for … Read more

At HOPE, EFF releases code for Open Wireless router

in News, security by the machinegeek | 0 comments

At last weekend’s HOPE Conference in New York City, the EFF released the code for their experimental hacker alpha wireless router software specifically designed to support secure, shareable Open Wireless networks. We are offering this hacker alpha release to engage … Read more

Linux security tip: moving your /boot partition to removable media

Today threats to your data can come from many quadrants. It’s not enough to protect against malicious online attacks; there’s the very real threat of government confiscating and examining the electronic devices carried by international travelers, and even planting spyware. … Read more

Shmoocon 2014: vehicle infotainment data forensics

Courtney Lancaster gave this talk at Shmoocon 2014 outlining the types of information available from vehicle infotainment systems “This talk will take an in-depth look at infotainment technologies and how to forensically acquire the data associated with the functionalities that … Read more

Academic paper: hacking with RF replay attacks

If you’re new to RF hacking you may have heard the term “replay attack” and wondered what it takes to implement one. In this academic presentation Practicing a Record-and-Replay System on USRP a group of researchers from the Shenzhen Key … Read more

Dissertation: security analysis of contactless payment cards

Here’s an interesting academic document we found related to hardware hacking. In this published doctoral dissertation, Timo Kasper from the Ruhr-University Bochum, Germany, presents in detail his efforts in analyzing the security of Mifare smart cards. “The tools are first … Read more

NSA wants to build quantum computer to penetrate “hard targets”

The Washington Post is reporting that the NSA is building a computer to defeat all forms of encryption commonly used to ensure privacy of personal communications and data. The project seeks to build “a cryptologically useful quantum computer” which would … Read more