- published: 27 Oct 2016
- views: 18259
In this episode of Hak5 we're joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/ ------------------------------- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 ------------------------------
Samy Kamkar is well known for many things, but lately it has been his hardware security hacks that have been turning heads. The nice thing to know is that, despite not having a background in hardware, Samy is able to run with the best of hardware researchers. At the Hackaday SuperConference he offered words of advice for anyone trying to walk the path of discovery with an exciting new piece of electronics. One might say it's a crash-course in how to be a hardware hacker. Read the article: Learn more about Samy Kamkar: Learn more about the Hackaday SuperConference
The *Starter Kit: Hardware Hacking* is about hacking low voltage mainstream devices to connect them with Tinkerforge modules. Any (Embedded-) PC, Smart Phone or Tablet can be used to interact with devices hacked by this kit. See http://www.tinkerforge.com/en/doc/Kits/HardwareHacking/HardwareHacking.html for more information.
Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals. We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance. The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the Main Stage auditorium. Video highlights:
PC Motherboard Hardware Hacking and PSU wire modification Tutorial - LP Here I take the unusual step of replacing some damaged motherboard components and modify a new PC PSU to fit my case. Soldering and wire splicing skills used as well as some surface mount hot air. My new PC is eating through PSU and will soon need a 1kw. Just for comparison, the same 5 minute video on my old PC was taking 1:48 to render (That is 1 HOUR and 48 MINUTES!) on the new one it takes 8 minutes! Twitter: https://twitter.com/BackofficeShow Facebook: https://www.facebook.com/AndrewsBackOffice Do not forget to follow @BackofficeShow on Twitter for regular updates on not only videos but my general shenanigans! http://twitter.com/BackofficeShow Don't be a stranger, please click here for updates: http://www.backof...
Webcast from 5/12/15 John Strand & Brian Fehrman discuss dumping firmware, using JTAGulator and analysis. Yes, there are demos (we still have some kinks to work out with our camera/live stream). We target a couple of devices you can easily acquire and practice on yourself. Why do this? Because the techniques we will cover in this webcast are the same techniques you can use to hack smart meters, access points, smart tv's, Malibu Stacy dolls, SCADA equipment and IP toasters. Yes, this is the core of next-gen hacking. Because next-gen is allays cool to catch the APTs with the IOCs.
Speaker: Dave King Hardware hacking is cool, but it can be daunting to software guys. Microcontrollers mix hardware and software basically allowing software guys to do hardware in software. Lately several products have emerged that make it even easier for software guys to get hardware up and working. Arduinos are relatively cheap, open source, all-in-one prototyping boards with a strong community behind them. All you need is a USB cable and the Arduino IDE (which is also open source). The Arduino language is easy to learn for anyone with even a basic knowledge of coding. Arduinos can be made into many different security devices including keyboard emulators, RFID readers/writers, combination lock brute forcing robots, magnetic stripe card emulators, and automated cell phone dia...
Many embedded systems contain design flaws that could lead to exploitable vulnerabilities. In order to discover such flaws, hackers and engineers use a specific set of tools. In this session, Joe will discuss his favorite open source hardware hacking and reverse engineering tools, including those that monitor/decode digital communications, extract firmware, inject/spoof data, and identify/connect to debug interfaces.
This time on Hak5 we venture back to DC for Shmoocon and meet up with Michael Ossmann of GreatScottGadgets.com to find out about project Ubertooth -- a custom hardware device for sniffing and injecting bluetooth packets. Then Shannon finds out the latest from Hackers For Charity with our good friend Johnny Long. Look out for even more Shmoocon coverage next week as we wrap up Hak5 season 8. http://www.kickstarter.com/projects/mossmann/ubertooth-one-an-open-source-bluetooth-test-tool http://www.hackersforcharity.org/
You might have a raspberry pi. You may even have a BeagleBone Black. If you’re lucky, you might have a TP-Link WR-703N or some other toys to play with. But wait.You might have a raspberry pi. You may even have a BeagleBone Black. If you’re lucky, you might have a TP-Link WR-703N or some other toys to play with. But wait. Have you ever considered building your own toys? From scratch? Crazy, no? As a firm believer in crazy, I’m going to do something different. I’m going to build you a hackety-hack platform using nothing but cheap parts from a supplier on the other side of the world. I’m going to talk about my design choices and processes. Then I’m going to do it on stage. I’m going to do it in real time, and I’m going to show you how to do it so you can build your own. It’s nothing partic...
Mouse folosit: http://www.emag.ro/mouse-optic-spacer-800-dpi-usb-black-spmo-080/pd/D3F2YMBBM/ ==========Links and info below============ Facebook: http://facebook.com/acidripp Twitter: http://twitter.com/acidripp Steam: http://steamcommunity.com/id/acidripp
It is clear that something is needed to help the security community to evaluate, audit and control the security level of hardware products. Hardsploit is a complete tool box (hardware & software), a framework which aims to: - Facilitate the audit of electronic systems for industry 'security' workers (consultants, auditors, pentesters, product designers, etc.) - Increase the level of security (and trust !) of new products designed by the industry Yann.A, Julien MOINARD, Gwénolé Audic