A MarketPlace of Ideas

Hacking

Computing

Lazy IoT, router makers reuse skeleton keys over and over in thousands of devices – SSH logins, server-side HTTPS certs baked in firmware

Research Links Lazy IoT keys

By Fudgy McFarlen, 9 years ago
Business

Hacker predicts AMEX card numbers, bypasses chip and PIN

Research Links Hacker predicts AMEX card numbers, bypasses chip and PIN  

By Fudgy McFarlen, 9 years ago
Apache-Server

Emarketbrasil hacked – Must Fix :( Much work. Wow

Research Links Google: website hacked "infected.txt" Timthumb Exploit causing plethora of sites to redirect to Russia  

By Fudgy McFarlen, 10 years ago
BitCoin

Black Hat USA 2014 – CloudBots – Harvesting Crypto Coins like a Botnet Farmer – 06Aug2014

Research Links Source Code for the tools

By Fudgy McFarlen, 10 years ago
Computing

SD Card Hacking

Research Links On Hacking MicroSD Cards SD Card Hacking GitHub:  This is a collection of utilities and source to work with assembly for the AX211 SD processor  

By Fudgy McFarlen, 10 yearsApril 7, 2015 ago
Computing

DEF CON 22 – Jesse Michael and Mickey Shkatov – USB for all!

Research Links Presentation in the video QEMU is a generic and open source machine emulator and virtualizer. USB Fuzzing Universal Serial Bus Device Class Specification for Device Firmware Upgrade USB Rubber Ducky Kautilya is a toolkit which provides various payloads for a Human Interface Device which may help in breaking Read more…

By Fudgy McFarlen, 10 yearsMarch 29, 2015 ago
Computing

DEFCON 20: Owning Bad Guys And Mafia With Javascript Botnets

Research Links Informatica64.com

By Fudgy McFarlen, 10 yearsMarch 27, 2015 ago
Computing

Defcon 21 Decapping Chips The Strike Easy Hard Way – Reverse Engineering

Reverse engineering of integrated circuits is challenging but in many circumstances can be done. Research Links Aperturelabs Adam's blog on Aperture Related Links Silicon Investigations Reference Material for IC Reverse Engineering

By Fudgy McFarlen, 10 yearsMarch 27, 2015 ago
Communication

Defcon 21 – The Secret Life of SIM Cards

Research Links ShadyTel Toorcamp Wiki Rainbow Table Karsten Nohl – Black Hat 2013 – Rooting SIM Cards GitHub: ShadyTel SIM tools SEEK for Android Android Explorations Using the SIM card as a secure element in Android simhacks – Information about SIM Cards and JavaCard STK Applets ShadyTel SIM cards for Read more…

By Fudgy McFarlen, 10 yearsMarch 23, 2015 ago
Computing

DEFCON 14: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights

Research Links Utility belt – is on the right margin atlasutils-2.2.19.tgz disass PDF Presentation from the video Book: Hacking: The Art of Exploitation Linkers and Loaders – Levine

By Fudgy McFarlen, 10 yearsMarch 21, 2015 ago

Posts pagination

Previous 1 … 5 6 7 … 9 Next
Categories
DashBoard
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • About
  • Book List
  • Daily Reads
  • Design Tools
  • Informatics
  • Library
  • Math-Science
  • Side Wikis
  • References
  • BookMarks
Hestia | Developed by ThemeIsle