- published: 19 Dec 2016
- views: 67909
Samy Kamkar is well known for many things, but lately it has been his hardware security hacks that have been turning heads. The nice thing to know is that, despite not having a background in hardware, Samy is able to run with the best of hardware researchers. At the Hackaday SuperConference he offered words of advice for anyone trying to walk the path of discovery with an exciting new piece of electronics. One might say it's a crash-course in how to be a hardware hacker. Read the article: Learn more about Samy Kamkar: Learn more about the Hackaday SuperConference
In this episode of Hak5 we're joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/ ------------------------------- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 ------------------------------ -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~-
The *Starter Kit: Hardware Hacking* is about hacking low voltage mainstream devices to connect them with Tinkerforge modules. Any (Embedded-) PC, Smart Phone or Tablet can be used to interact with devices hacked by this kit. See http://www.tinkerforge.com/en/doc/Kits/HardwareHacking/HardwareHacking.html for more information.
Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals. We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance. The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the Main Stage auditorium. Video highlights:
Webcast from 5/12/15 John Strand & Brian Fehrman discuss dumping firmware, using JTAGulator and analysis. Yes, there are demos (we still have some kinks to work out with our camera/live stream). We target a couple of devices you can easily acquire and practice on yourself. Why do this? Because the techniques we will cover in this webcast are the same techniques you can use to hack smart meters, access points, smart tv's, Malibu Stacy dolls, SCADA equipment and IP toasters. Yes, this is the core of next-gen hacking. Because next-gen is allays cool to catch the APTs with the IOCs.
PC Motherboard Hardware Hacking and PSU wire modification Tutorial - LP Here I take the unusual step of replacing some damaged motherboard components and modify a new PC PSU to fit my case. Soldering and wire splicing skills used as well as some surface mount hot air. My new PC is eating through PSU and will soon need a 1kw. Just for comparison, the same 5 minute video on my old PC was taking 1:48 to render (That is 1 HOUR and 48 MINUTES!) on the new one it takes 8 minutes! Twitter: https://twitter.com/BackofficeShow Facebook: https://www.facebook.com/AndrewsBackOffice Do not forget to follow @BackofficeShow on Twitter for regular updates on not only videos but my general shenanigans! http://twitter.com/BackofficeShow Don't be a stranger, please click here for updates: http://www.backof...
In this video I talk about the tools required to modify a router slightly, so that the serial console can be accessed. The serial console is basically a backdoor, sometimes "locked", into the heart of the router. Having serial console access enables you to find out what's going on when your router boots up (i.e. starts), which may provide information about misconfigurations or other interesting information, because even if you can't modify the boot parameters without reflashing the device, and it prompts you with a login screen that cannot easily be guessed, then you still have access to the entire bootlog which can provide useful in many cases. Safety Disclaimer: Soldering irons are tools that should be handled properly as they can easily cause injury. Soldering thread containing lead ...
Many embedded systems contain design flaws that could lead to exploitable vulnerabilities. In order to discover such flaws, hackers and engineers use a specific set of tools. In this session, Joe will discuss his favorite open source hardware hacking and reverse engineering tools, including those that monitor/decode digital communications, extract firmware, inject/spoof data, and identify/connect to debug interfaces.
Mouse folosit: http://www.emag.ro/mouse-optic-spacer-800-dpi-usb-black-spmo-080/pd/D3F2YMBBM/ ==========Links and info below============ Facebook: http://facebook.com/acidripp Twitter: http://twitter.com/acidripp Steam: http://steamcommunity.com/id/acidripp
DIY Robocars is a online and in-person community for people interested in developing small scale autonomous cars. Learn more at diyrobocars.com ------------------------------------------------------------ Visit us on the web! http://www.makezine.com Go to a Maker Faire! http://www.makerfaire.com Subscribe to the Magazine! http://www.makezine.com/subscribe Twitch.TV: http://www.twitch.tv/make/profile Follow us on Twitter: https://twitter.com/make Instagram: https://instagram.com/makemagazine/ Facebook: https://www.facebook.com/makemagazine Pinterest: https://www.pinterest.com/makemagazine/
Arduino is everywhere, but so is electronic junk. Got a project in mind? Take something you already have and repurpose it instead. Make it into something more interesting, for free! Learn how it works, see what it's really capable of and save it from landfill. In this talk, we'll journey through some examples of common electronic devices to find out: - Why things are hackable, which useful interfaces they may have and how to use them.
Hacker Tactics the hacker hardware tools for hacking. become a hacker by this tools. Now hacking made easy Hackers tools link:- Wifi pineapple - https://goo.gl/w2t6oT LAN Turtle - https://goo.gl/FRtpMf Rubber Ducky - https://goo.gl/GT9kWV Bash Bunny - https://goo.gl/V3VZMp Thanks For watching :- If you like video please SUBSCRIBE FACEBOOK:- https://www.facebook.com/luckyhacks7/ TWITTER:- https://twitter.com/LuckyHacks7 INSTAGRAM :- https://www.instagram.com/luckyhacks7/ blog:- https://luckyhackscode.blogspot.in/ Youtube channel :-https://goo.gl/iSU2HU
In this video I double check that I haven't shorted out the custom USB cable, before connecting it to the computer and Samsung phone. After that I do a basic test of the Samsung UART cable to see if it's working, and give a few pointers on how to access the S-BOOT menu. Special Thanks: - Josh (First elite supporter!) Warranty Disclaimer: Accessing the UART console on your Samsung device may void the warranty and in some cases even brick your device (i.e. make it unusable). Stay tuned and subscribe for more upcoming videos showing actual hacks! Twitter: @CrazyDaneHacker Facebook: https://www.facebook.com/crazydanishhacker Patreon: https://www.patreon.com/crazydanishhacker Website: https://www.crazydanishhacker.com/
In this video I begin assembling a multi-RTL by removing the crystal from one of the RTL-SDRs (R820T or R820T2) and also one of the capacitors. Following that, I begin soldering on the wires connecting the two RTL-SDRs, where they will both share the same crystal. Special Thanks: - Josh (First elite supporter!) Warranty Disclaimer: Modifying your RTL-SDR will almost definitely void any warranties you might have. Safety Disclaimer: Soldering irons are tools that should be handled properly as they can easily cause injury. Soldering thread containing lead is toxic and should not be exposed to open wounds. If you do a lot of soldering, then you should consider wearing some thin gloves. (Not plastic!) Always wash your hands after handling lead. If you're going to eat something while solde...
Music for working with hardware and software. Best effects in full screen! Comment! Rate! Enjoy! Subscribe if you like! This man make this sexy girl https://www.artstation.com/artwork/e6NoX Play list https://www.youtube.com/playlist?list=PLUja9J5M1XReqoBal5IKog_PWz2Q_hZ7Y
Slides available at: https://download.exploitee.rs/file/generic/BH2017-Hacking-Hardware-With-A-10-Reader.pdf Whitepaper available at: https://download.exploitee.rs/file/generic/BH2017-Hacking-Hardware-With-A-10-Reader-wp.pdf Say hello on IRC: irc.freenode.net:6667 #Exploiteers Check out our site: https://Exploitee.rs
This hardware hacking kit is about hacking mainstream devices such that hacking low voltage devices. With this hacking kit you can be able to hack or interact with our devices like smart phone, pc and tablet. Main part which help in hacking or getting control about low voltage devices is tinkerforge modules. In this video you will learn step by step making and testing. Step:1) unboxing Step: 2) open remote control Step: 3) hack remote control Step: 4) connect to pc Step: 5) testing Step: 6) fun will know commence DON'T FORGET TO:) LIKE, SHARE, SUBSCRIBE This link will clear your doubt about tinkerforge modules https://www.tinkerforge.com/en/
Hijacking a jack
I gadget più utilizzati e costruiti da hacker e cracker, alcuni di essi sono veramente sorprendenti! Si va dall'hack wifi o carte di credito, e porte a chiusura magnetica, fino ad arrivare alle frequenze radio! Eccoti dei LINK UTILI: Altri Video Teorici: https://goo.gl/F3rEbA Gruppo Telegram: https://goo.gl/xKIfHQ Facebook: https://www.facebook.com/AfTutorial
You might have a raspberry pi. You may even have a BeagleBone Black. If you’re lucky, you might have a TP-Link WR-703N or some other toys to play with. But wait.You might have a raspberry pi. You may even have a BeagleBone Black. If you’re lucky, you might have a TP-Link WR-703N or some other toys to play with. But wait. Have you ever considered building your own toys? From scratch? Crazy, no? As a firm believer in crazy, I’m going to do something different. I’m going to build you a hackety-hack platform using nothing but cheap parts from a supplier on the other side of the world. I’m going to talk about my design choices and processes. Then I’m going to do it on stage. I’m going to do it in real time, and I’m going to show you how to do it so you can build your own. It’s nothing partic...
El hardware también tiene vulnerabilidades, estas por supuesto deben explotarse de cerca, por increíble que parezca muchos analistas de seguridad le restan importancia a la seguridad física, quizás aquí no las estoy listando todas, pero si las mas importantes. Regálame un caramelo o una cerveza : https://www.paypal.com/cgi-bin/webscr?cmd=_donations&business=saturnowgep%40hotmail%2ecom&lc=AL&item_name=Giovaelpetv&no_note=0¤cy_code=USD&bn=PP%2dDonationsBF%3abtn_donateCC_LG%2egif%3aNonHostedGuest Código fuente del USB Rubber Ducky hecho con Arduino: https://drive.google.com/open?id=0B1iGBZlMDbzbU0pfaktKWWd5SHM Enlaces a los sitios de compra de cada uno: https://hakshop.com/products/usb-rubber-ducky-deluxe https://www.amazon.com/Wi-Fi-Premium-Hardware-Keylogger-compatibility/dp/B00EN...
This was one of the most popular talks at S4xEurope. Dmitry Nedospasov went into non-invasive, semi-invasive and fully invasive methods to extract information from hardware. A couple of highlights: 5:30 An answer to "what are the levels and effectiveness of security for chips"? BTW, among the most secure is your pay TV card. 11:00 A nice chart with the classes of attack Just watch the whole thing if this is something you are interested in. Dmitry knows his stuff and gets into a lot of detail.