-
Joe Grand's Hardware Hacking Basics
Video description of my Hardware Hacking Basics training course. This two-day class teaches techniques to explore, manipulate, and exploit electronic systems. Additional one-day workshops are available that provide more detail into specific attack vectors.
Complete details are available from: http://www.grandideastudio.com/portfolio/hardware-hacking-training/
A list of currently scheduled public classes is available from: http://www.grandideastudio.com/events/
published: 13 Sep 2017
-
Philippe Laulheret - Intro to Hardware Hacking - DEF CON 27 Conference
From small business to large enterprise, VOIP phones can be found on nearly every desk. But how secure are they? What if your phone was spying on every conversation you have?
This talk is an introduction to hardware hacking and as a case study I’ll use the [REDACTED] Deskphone, a device frequently deployed in corporate environments. I’ll use it to introduce the tools and methodology needed to answer these questions.
During this talk, attendees will get a close up look at the operations of a hardware hacker, including ARM disassembly, firmware extraction using binwalk, micro-soldering to patch an EEPROM and get a root shell over UART, and ultimately uncover an already known decade-old bug that somehow remained unnoticed in the device’s firmware.
Beyond the case study I will also address ...
published: 16 Nov 2019
-
No Code Hardware Hacking - Introducing Glitchy
*BECOME A PATREON!*
https://www.patreon.com/RECESSIM
Glitchy fuses together all the peripherals you need to hack hardware without wring a single line of code! Glitch processors like a PRO! Full source code available on my GitHub below.
Video uses the following hardware in the demo:
NewAE ChipWhisperer: https://www.newae.com/chipwhisperer
Envox BB3 Power Supply: https://www.envox.eu/eez-bb3/
VoltLog VoltLink Serial Adaptor: https://www.tindie.com/products/voltlog/voltlink-cp2102n-usb-serial-adapter-programmer/
Landing Site: https://recessim.com/
Twitter: https://twitter.com/BitBangingBytes
Discord: https://discord.gg/3ebeyMP
GitHub: https://github.com/BitBangingBytes
Wiki: https://wiki.recessim.com
Full Disclosure: VoltLog sent me the serial adaptor for free because they liked my videos...
published: 29 Oct 2022
-
Hardware Hacking Live at S4x16
Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance.
The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the Main Stage auditorium.
Video highlights:
published: 29 Jun 2016
-
Fun With HARDWARE HACKING!!! - UART ROOT SHELLS and Finding SECRETS!
Recently I've been learning about IoT and hardware hacking, so I thought it would be fun to crack open a wifi router that was so generously donated to me and see if I could find a UART and connect to it. From there I hope to see if I could find any sensitive data and use that to gain access to the router through the admin web-portal. So hold on to your multi-meter and let's hack a router!!! :)
Chapters
=================
00:00 Intro
01:00 The Plan of Attack
01:55 The Gear
06:02 Identifying UART Pins with Multi-meter
16:33 Connecting UART to TTL-to-USB
20:00 Terminal Emulator Settings
22:08 We Have SHELL!!!
24:58 Finding Secrets
29:45 Closing Thoughts
#iot #iotsecurity #hardwarehacking #iothacking #uart #jtag #jtagulator #redteam #redteaming #arduino #raspberry...
published: 16 Sep 2022
-
Hardware Hacking Tools: Digital Multimeter
In this video series I share some of the tools I use in my everyday work and side projects.
About Me:
My name is Matt Brown and I'm an Embedded Security Pentester and Reverse Engineer that loves all things Linux. Over my career I have had a wide array of Security, System Administration and Software Engineering experience that I enjoy bringing to bear on tough business problems. I enjoy finding vulnerabilities and helping businesses remediate those vulnerabilities to create better products and services for their customers.
Social:
twitter: https://twitter.com/nmatt0
linkedin: https://www.linkedin.com/in/mattbrwn/
github: https://github.com/nmatt0/
#soldering #solderingiron #tools #workbench #iot
published: 13 Jan 2023
-
Top 5 Best Hacking Hardware
This video details the best hacking hardware out there in my opinion.
🔴 Get $100 FREE credit on Linode to create your own cloud server (Valid for 60 days)👇
https://www.linode.com/zsecurity
---------------------------------------------------------------
🔌 First 3 tools can be found in our shop 👇
zSecurity shop - https://zsecurity.org/shop/
---------------------------------------------------------------
🧠 My Hacking Masterclass👇
https://zsecurity.org/courses/masterclass-membership/
🧠 My other hacking courses 👇
https://zsecurity.org/courses/
🌟 VIP Membership (Discord) 👇
https://zsecurity.org/vip-membership/
---------------------------------------------------------------
zSecurity Company - https://zsecurity.com/
Community - https://zsecurity.org/
Facebook - https://www.facebook.com/ZSec...
published: 23 Jun 2022
-
Samsung UART - DEMO - Hardware Hacking Series #9
In this video I double check that I haven't shorted out the custom USB cable, before connecting it to the computer and Samsung phone. After that I do a basic test of the Samsung UART cable to see if it's working, and give a few pointers on how to access the S-BOOT menu.
Special Thanks:
- Josh (First elite supporter!)
Warranty Disclaimer: Accessing the UART console on your Samsung device may void the warranty and in some cases even brick your device (i.e. make it unusable).
Stay tuned and subscribe for more upcoming videos showing actual hacks!
Twitter: @CrazyDaneHacker
Facebook: https://www.facebook.com/crazydanishhacker
Patreon: https://www.patreon.com/crazydanishhacker
Website: https://www.crazydanishhacker.com/
published: 09 Apr 2018
-
Top 10 Hacking Tools and Gadgets: The Ultimate Hacker's Toolkit
In this intriguing video, join us as we delve into the world of cybersecurity and unveil the top 10 hacking gadgets that every tech enthusiast should be aware of. From portable Wi-Fi hacking tools to USB keystroke loggers, we've got you covered with essential information on these devices. Remember, knowledge is power, and understanding these tools is crucial for staying safe online. Watch till the end to discover how these gadgets work and how to protect yourself from potential threats. Like and share this video with your fellow tech enthusiasts for a deeper insight into cybersecurity! #HackingGadgets #TechEnthusiast #CybersecurityEducation
See Less
OUTLINE:
00:00:00
Introduction
00:00:31
HackRF One
00:01:16
Raspberry Pi 5 Starter Kit
00:02:01
WiFi Pineapple
00:02:53
USB Rubber Ducky
...
published: 27 Feb 2024
-
How I hacked a hardware crypto wallet and recovered $2 million
I was contacted to hack a Trezor One hardware wallet and recover $2 million worth of cryptocurrency (in the form of THETA). Knowing that existing research was already out there for this device, it seemed like it would be a slam dunk. Little did I realize the project would turn into a roller coaster ride with over three months of experimentation, failures, successes, and heart-stopping moments. It reminded me that hacking is always unpredictable, exciting, and educational, no matter how long you've been doing it. In this case, the stakes were higher than normal: I only had one chance to get it right.
Read about it on The Verge: https://www.theverge.com/2022/1/24/22898712/crypto-hardware-wallet-hacking-lost-bitcoin-ethereum-nft
Check out Joe Grand here:
YouTube: https://youtube.com/c/JoeG...
published: 24 Jan 2022
1:30
Joe Grand's Hardware Hacking Basics
Video description of my Hardware Hacking Basics training course. This two-day class teaches techniques to explore, manipulate, and exploit electronic systems. A...
Video description of my Hardware Hacking Basics training course. This two-day class teaches techniques to explore, manipulate, and exploit electronic systems. Additional one-day workshops are available that provide more detail into specific attack vectors.
Complete details are available from: http://www.grandideastudio.com/portfolio/hardware-hacking-training/
A list of currently scheduled public classes is available from: http://www.grandideastudio.com/events/
https://wn.com/Joe_Grand's_Hardware_Hacking_Basics
Video description of my Hardware Hacking Basics training course. This two-day class teaches techniques to explore, manipulate, and exploit electronic systems. Additional one-day workshops are available that provide more detail into specific attack vectors.
Complete details are available from: http://www.grandideastudio.com/portfolio/hardware-hacking-training/
A list of currently scheduled public classes is available from: http://www.grandideastudio.com/events/
- published: 13 Sep 2017
- views: 51471
46:07
Philippe Laulheret - Intro to Hardware Hacking - DEF CON 27 Conference
From small business to large enterprise, VOIP phones can be found on nearly every desk. But how secure are they? What if your phone was spying on every conversa...
From small business to large enterprise, VOIP phones can be found on nearly every desk. But how secure are they? What if your phone was spying on every conversation you have?
This talk is an introduction to hardware hacking and as a case study I’ll use the [REDACTED] Deskphone, a device frequently deployed in corporate environments. I’ll use it to introduce the tools and methodology needed to answer these questions.
During this talk, attendees will get a close up look at the operations of a hardware hacker, including ARM disassembly, firmware extraction using binwalk, micro-soldering to patch an EEPROM and get a root shell over UART, and ultimately uncover an already known decade-old bug that somehow remained unnoticed in the device’s firmware.
Beyond the case study I will also address alternative tactics; some did not work, others may have but were not the lowest-hanging fruit. When it comes to hardware hacking, the process is as important as the result; knowing that there are multiple ways to reach the end goal helps researchers remain confident when hurdles arise. After the talk, attendees will have an increased distrust towards always-on devices; however, they will have the background knowledge to investigate the products and systems they encounter daily.
Philippe Laulheret
Philippe Laulheret is a Senior Security Researcher on the McAfee Advanced Threat Research team. With a focus on Reverse Engineering and Vulnerability Research, Philippe uses his background in Embedded Security and Software Engineering to poke at complex system and get them to behave in interesting ways. He previously talked about Reverse Engineering PSX game at Bsides PDX, created & contributed to some Hardware Hacking CTF when working at Red Balloon Security and shared the love of tearing apart VOIP phones during ad-hoc workshops at multiple conferences (Summer Con, Hardware Hacking Village, etc.)
Twitter: @phLaul
https://wn.com/Philippe_Laulheret_Intro_To_Hardware_Hacking_Def_Con_27_Conference
From small business to large enterprise, VOIP phones can be found on nearly every desk. But how secure are they? What if your phone was spying on every conversation you have?
This talk is an introduction to hardware hacking and as a case study I’ll use the [REDACTED] Deskphone, a device frequently deployed in corporate environments. I’ll use it to introduce the tools and methodology needed to answer these questions.
During this talk, attendees will get a close up look at the operations of a hardware hacker, including ARM disassembly, firmware extraction using binwalk, micro-soldering to patch an EEPROM and get a root shell over UART, and ultimately uncover an already known decade-old bug that somehow remained unnoticed in the device’s firmware.
Beyond the case study I will also address alternative tactics; some did not work, others may have but were not the lowest-hanging fruit. When it comes to hardware hacking, the process is as important as the result; knowing that there are multiple ways to reach the end goal helps researchers remain confident when hurdles arise. After the talk, attendees will have an increased distrust towards always-on devices; however, they will have the background knowledge to investigate the products and systems they encounter daily.
Philippe Laulheret
Philippe Laulheret is a Senior Security Researcher on the McAfee Advanced Threat Research team. With a focus on Reverse Engineering and Vulnerability Research, Philippe uses his background in Embedded Security and Software Engineering to poke at complex system and get them to behave in interesting ways. He previously talked about Reverse Engineering PSX game at Bsides PDX, created & contributed to some Hardware Hacking CTF when working at Red Balloon Security and shared the love of tearing apart VOIP phones during ad-hoc workshops at multiple conferences (Summer Con, Hardware Hacking Village, etc.)
Twitter: @phLaul
- published: 16 Nov 2019
- views: 74152
22:56
No Code Hardware Hacking - Introducing Glitchy
*BECOME A PATREON!*
https://www.patreon.com/RECESSIM
Glitchy fuses together all the peripherals you need to hack hardware without wring a single line of code! ...
*BECOME A PATREON!*
https://www.patreon.com/RECESSIM
Glitchy fuses together all the peripherals you need to hack hardware without wring a single line of code! Glitch processors like a PRO! Full source code available on my GitHub below.
Video uses the following hardware in the demo:
NewAE ChipWhisperer: https://www.newae.com/chipwhisperer
Envox BB3 Power Supply: https://www.envox.eu/eez-bb3/
VoltLog VoltLink Serial Adaptor: https://www.tindie.com/products/voltlog/voltlink-cp2102n-usb-serial-adapter-programmer/
Landing Site: https://recessim.com/
Twitter: https://twitter.com/BitBangingBytes
Discord: https://discord.gg/3ebeyMP
GitHub: https://github.com/BitBangingBytes
Wiki: https://wiki.recessim.com
Full Disclosure: VoltLog sent me the serial adaptor for free because they liked my videos, I included it in my video without any compensation because I like their product!
https://wn.com/No_Code_Hardware_Hacking_Introducing_Glitchy
*BECOME A PATREON!*
https://www.patreon.com/RECESSIM
Glitchy fuses together all the peripherals you need to hack hardware without wring a single line of code! Glitch processors like a PRO! Full source code available on my GitHub below.
Video uses the following hardware in the demo:
NewAE ChipWhisperer: https://www.newae.com/chipwhisperer
Envox BB3 Power Supply: https://www.envox.eu/eez-bb3/
VoltLog VoltLink Serial Adaptor: https://www.tindie.com/products/voltlog/voltlink-cp2102n-usb-serial-adapter-programmer/
Landing Site: https://recessim.com/
Twitter: https://twitter.com/BitBangingBytes
Discord: https://discord.gg/3ebeyMP
GitHub: https://github.com/BitBangingBytes
Wiki: https://wiki.recessim.com
Full Disclosure: VoltLog sent me the serial adaptor for free because they liked my videos, I included it in my video without any compensation because I like their product!
- published: 29 Oct 2022
- views: 18389
19:03
Hardware Hacking Live at S4x16
Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like...
Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance.
The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the Main Stage auditorium.
Video highlights:
https://wn.com/Hardware_Hacking_Live_At_S4X16
Andrew Zonenberg of IOActive shows how to pull firmware from a chip using a microscope, nail polish, a hot plate and a few chemicals.
We set this up to be like a cooking segment on a morning show. Andrew had chips in various states so he could show it all quickly. The bit that used hazardous chemicals was filmed in advance.
The only downside of this video is we didn't record the feed from the microscope and computer that was available to attendees in the Main Stage auditorium.
Video highlights:
- published: 29 Jun 2016
- views: 37888
31:15
Fun With HARDWARE HACKING!!! - UART ROOT SHELLS and Finding SECRETS!
Recently I've been learning about IoT and hardware hacking, so I thought it would be fun to crack open a wifi router that was so generously donated to me and se...
Recently I've been learning about IoT and hardware hacking, so I thought it would be fun to crack open a wifi router that was so generously donated to me and see if I could find a UART and connect to it. From there I hope to see if I could find any sensitive data and use that to gain access to the router through the admin web-portal. So hold on to your multi-meter and let's hack a router!!! :)
Chapters
=================
00:00 Intro
01:00 The Plan of Attack
01:55 The Gear
06:02 Identifying UART Pins with Multi-meter
16:33 Connecting UART to TTL-to-USB
20:00 Terminal Emulator Settings
22:08 We Have SHELL!!!
24:58 Finding Secrets
29:45 Closing Thoughts
#iot #iotsecurity #hardwarehacking #iothacking #uart #jtag #jtagulator #redteam #redteaming #arduino #raspberrypi #cybersecurity #hacker #hacking #informationsecurity #infosec #penetrationtester #pentesting #ethicalhacker #ethicalhacking
https://wn.com/Fun_With_Hardware_Hacking_Uart_Root_Shells_And_Finding_Secrets
Recently I've been learning about IoT and hardware hacking, so I thought it would be fun to crack open a wifi router that was so generously donated to me and see if I could find a UART and connect to it. From there I hope to see if I could find any sensitive data and use that to gain access to the router through the admin web-portal. So hold on to your multi-meter and let's hack a router!!! :)
Chapters
=================
00:00 Intro
01:00 The Plan of Attack
01:55 The Gear
06:02 Identifying UART Pins with Multi-meter
16:33 Connecting UART to TTL-to-USB
20:00 Terminal Emulator Settings
22:08 We Have SHELL!!!
24:58 Finding Secrets
29:45 Closing Thoughts
#iot #iotsecurity #hardwarehacking #iothacking #uart #jtag #jtagulator #redteam #redteaming #arduino #raspberrypi #cybersecurity #hacker #hacking #informationsecurity #infosec #penetrationtester #pentesting #ethicalhacker #ethicalhacking
- published: 16 Sep 2022
- views: 15859
6:46
Hardware Hacking Tools: Digital Multimeter
In this video series I share some of the tools I use in my everyday work and side projects.
About Me:
My name is Matt Brown and I'm an Embedded Security Pentes...
In this video series I share some of the tools I use in my everyday work and side projects.
About Me:
My name is Matt Brown and I'm an Embedded Security Pentester and Reverse Engineer that loves all things Linux. Over my career I have had a wide array of Security, System Administration and Software Engineering experience that I enjoy bringing to bear on tough business problems. I enjoy finding vulnerabilities and helping businesses remediate those vulnerabilities to create better products and services for their customers.
Social:
twitter: https://twitter.com/nmatt0
linkedin: https://www.linkedin.com/in/mattbrwn/
github: https://github.com/nmatt0/
#soldering #solderingiron #tools #workbench #iot
https://wn.com/Hardware_Hacking_Tools_Digital_Multimeter
In this video series I share some of the tools I use in my everyday work and side projects.
About Me:
My name is Matt Brown and I'm an Embedded Security Pentester and Reverse Engineer that loves all things Linux. Over my career I have had a wide array of Security, System Administration and Software Engineering experience that I enjoy bringing to bear on tough business problems. I enjoy finding vulnerabilities and helping businesses remediate those vulnerabilities to create better products and services for their customers.
Social:
twitter: https://twitter.com/nmatt0
linkedin: https://www.linkedin.com/in/mattbrwn/
github: https://github.com/nmatt0/
#soldering #solderingiron #tools #workbench #iot
- published: 13 Jan 2023
- views: 1389
11:41
Top 5 Best Hacking Hardware
This video details the best hacking hardware out there in my opinion.
🔴 Get $100 FREE credit on Linode to create your own cloud server (Valid for 60 days)👇
htt...
This video details the best hacking hardware out there in my opinion.
🔴 Get $100 FREE credit on Linode to create your own cloud server (Valid for 60 days)👇
https://www.linode.com/zsecurity
---------------------------------------------------------------
🔌 First 3 tools can be found in our shop 👇
zSecurity shop - https://zsecurity.org/shop/
---------------------------------------------------------------
🧠 My Hacking Masterclass👇
https://zsecurity.org/courses/masterclass-membership/
🧠 My other hacking courses 👇
https://zsecurity.org/courses/
🌟 VIP Membership (Discord) 👇
https://zsecurity.org/vip-membership/
---------------------------------------------------------------
zSecurity Company - https://zsecurity.com/
Community - https://zsecurity.org/
Facebook - https://www.facebook.com/ZSecurity-1453250781458287/
Twitter - https://twitter.com/_zSecurity_
Instagram - https://www.instagram.com/zsecurity_org/
Linkedin - https://www.linkedin.com/company/zsecurity-org/
TikTok - https://www.tiktok.com/@zsecurity_org
---------------------------------------------------------------
Time Stamps:
00:00 - intro
00:55 - Thanks to Linode :)
02:06 - 1. Keystroke Injectors.
05:09 - 2. Hardware Keylogers.
06:34 - 3. Wireless Adapters.
07:37 - 4. Phone with NetHunter.
08:50 - 5. Raspberry Pi.
09:52 - Think Outside the Box.
https://wn.com/Top_5_Best_Hacking_Hardware
This video details the best hacking hardware out there in my opinion.
🔴 Get $100 FREE credit on Linode to create your own cloud server (Valid for 60 days)👇
https://www.linode.com/zsecurity
---------------------------------------------------------------
🔌 First 3 tools can be found in our shop 👇
zSecurity shop - https://zsecurity.org/shop/
---------------------------------------------------------------
🧠 My Hacking Masterclass👇
https://zsecurity.org/courses/masterclass-membership/
🧠 My other hacking courses 👇
https://zsecurity.org/courses/
🌟 VIP Membership (Discord) 👇
https://zsecurity.org/vip-membership/
---------------------------------------------------------------
zSecurity Company - https://zsecurity.com/
Community - https://zsecurity.org/
Facebook - https://www.facebook.com/ZSecurity-1453250781458287/
Twitter - https://twitter.com/_zSecurity_
Instagram - https://www.instagram.com/zsecurity_org/
Linkedin - https://www.linkedin.com/company/zsecurity-org/
TikTok - https://www.tiktok.com/@zsecurity_org
---------------------------------------------------------------
Time Stamps:
00:00 - intro
00:55 - Thanks to Linode :)
02:06 - 1. Keystroke Injectors.
05:09 - 2. Hardware Keylogers.
06:34 - 3. Wireless Adapters.
07:37 - 4. Phone with NetHunter.
08:50 - 5. Raspberry Pi.
09:52 - Think Outside the Box.
- published: 23 Jun 2022
- views: 330100
14:50
Samsung UART - DEMO - Hardware Hacking Series #9
In this video I double check that I haven't shorted out the custom USB cable, before connecting it to the computer and Samsung phone. After that I do a basic te...
In this video I double check that I haven't shorted out the custom USB cable, before connecting it to the computer and Samsung phone. After that I do a basic test of the Samsung UART cable to see if it's working, and give a few pointers on how to access the S-BOOT menu.
Special Thanks:
- Josh (First elite supporter!)
Warranty Disclaimer: Accessing the UART console on your Samsung device may void the warranty and in some cases even brick your device (i.e. make it unusable).
Stay tuned and subscribe for more upcoming videos showing actual hacks!
Twitter: @CrazyDaneHacker
Facebook: https://www.facebook.com/crazydanishhacker
Patreon: https://www.patreon.com/crazydanishhacker
Website: https://www.crazydanishhacker.com/
https://wn.com/Samsung_Uart_Demo_Hardware_Hacking_Series_9
In this video I double check that I haven't shorted out the custom USB cable, before connecting it to the computer and Samsung phone. After that I do a basic test of the Samsung UART cable to see if it's working, and give a few pointers on how to access the S-BOOT menu.
Special Thanks:
- Josh (First elite supporter!)
Warranty Disclaimer: Accessing the UART console on your Samsung device may void the warranty and in some cases even brick your device (i.e. make it unusable).
Stay tuned and subscribe for more upcoming videos showing actual hacks!
Twitter: @CrazyDaneHacker
Facebook: https://www.facebook.com/crazydanishhacker
Patreon: https://www.patreon.com/crazydanishhacker
Website: https://www.crazydanishhacker.com/
- published: 09 Apr 2018
- views: 27814
8:52
Top 10 Hacking Tools and Gadgets: The Ultimate Hacker's Toolkit
In this intriguing video, join us as we delve into the world of cybersecurity and unveil the top 10 hacking gadgets that every tech enthusiast should be aware o...
In this intriguing video, join us as we delve into the world of cybersecurity and unveil the top 10 hacking gadgets that every tech enthusiast should be aware of. From portable Wi-Fi hacking tools to USB keystroke loggers, we've got you covered with essential information on these devices. Remember, knowledge is power, and understanding these tools is crucial for staying safe online. Watch till the end to discover how these gadgets work and how to protect yourself from potential threats. Like and share this video with your fellow tech enthusiasts for a deeper insight into cybersecurity! #HackingGadgets #TechEnthusiast #CybersecurityEducation
See Less
OUTLINE:
00:00:00
Introduction
00:00:31
HackRF One
00:01:16
Raspberry Pi 5 Starter Kit
00:02:01
WiFi Pineapple
00:02:53
USB Rubber Ducky
00:03:48
Alfa AWUS036NHA Wireless Adapter
00:04:43
LAN Turtle
00:05:39
Flipper Zero
00:06:29
Lockpick Set
00:07:19
Rubber Hose Decryption Key
00:08:13
ExpressVPN
#hacker #trending #cybersecurity #hacking #hackingtools #hackers #cybersecurity #technology #gadgets #tools #software #programming #security #infosec #pentesting
https://wn.com/Top_10_Hacking_Tools_And_Gadgets_The_Ultimate_Hacker's_Toolkit
In this intriguing video, join us as we delve into the world of cybersecurity and unveil the top 10 hacking gadgets that every tech enthusiast should be aware of. From portable Wi-Fi hacking tools to USB keystroke loggers, we've got you covered with essential information on these devices. Remember, knowledge is power, and understanding these tools is crucial for staying safe online. Watch till the end to discover how these gadgets work and how to protect yourself from potential threats. Like and share this video with your fellow tech enthusiasts for a deeper insight into cybersecurity! #HackingGadgets #TechEnthusiast #CybersecurityEducation
See Less
OUTLINE:
00:00:00
Introduction
00:00:31
HackRF One
00:01:16
Raspberry Pi 5 Starter Kit
00:02:01
WiFi Pineapple
00:02:53
USB Rubber Ducky
00:03:48
Alfa AWUS036NHA Wireless Adapter
00:04:43
LAN Turtle
00:05:39
Flipper Zero
00:06:29
Lockpick Set
00:07:19
Rubber Hose Decryption Key
00:08:13
ExpressVPN
#hacker #trending #cybersecurity #hacking #hackingtools #hackers #cybersecurity #technology #gadgets #tools #software #programming #security #infosec #pentesting
- published: 27 Feb 2024
- views: 220
32:18
How I hacked a hardware crypto wallet and recovered $2 million
I was contacted to hack a Trezor One hardware wallet and recover $2 million worth of cryptocurrency (in the form of THETA). Knowing that existing research was a...
I was contacted to hack a Trezor One hardware wallet and recover $2 million worth of cryptocurrency (in the form of THETA). Knowing that existing research was already out there for this device, it seemed like it would be a slam dunk. Little did I realize the project would turn into a roller coaster ride with over three months of experimentation, failures, successes, and heart-stopping moments. It reminded me that hacking is always unpredictable, exciting, and educational, no matter how long you've been doing it. In this case, the stakes were higher than normal: I only had one chance to get it right.
Read about it on The Verge: https://www.theverge.com/2022/1/24/22898712/crypto-hardware-wallet-hacking-lost-bitcoin-ethereum-nft
Check out Joe Grand here:
YouTube: https://youtube.com/c/JoeGrand
Website: http://www.grandideastudio.com
Twitter: https://twitter.com/joegrand
Special thanks to:
wallet.fail: https://wallet.fail
Colin O'Flynn: https://twitter.com/colinoflynn
NewAE Technology: https://newae.com
Macdonald Entertainment Partners: https://macdonaldentertainmentpartners.com
Chase McDaniel: https://www.mercuryroadmedia.com
Dan Reich: https://danreich.com/i-had-2-million-dollars-in-crypto-locked-on-a-wallet
ABOUT OFFSPEC.IO
offspec.io (https://offspec.io) is a dedicated team of hackers and entrepreneurs specializing in password recovery from hardware and software wallets. We're always looking for new and interesting projects where we can use our skills to help others.
https://wn.com/How_I_Hacked_A_Hardware_Crypto_Wallet_And_Recovered_2_Million
I was contacted to hack a Trezor One hardware wallet and recover $2 million worth of cryptocurrency (in the form of THETA). Knowing that existing research was already out there for this device, it seemed like it would be a slam dunk. Little did I realize the project would turn into a roller coaster ride with over three months of experimentation, failures, successes, and heart-stopping moments. It reminded me that hacking is always unpredictable, exciting, and educational, no matter how long you've been doing it. In this case, the stakes were higher than normal: I only had one chance to get it right.
Read about it on The Verge: https://www.theverge.com/2022/1/24/22898712/crypto-hardware-wallet-hacking-lost-bitcoin-ethereum-nft
Check out Joe Grand here:
YouTube: https://youtube.com/c/JoeGrand
Website: http://www.grandideastudio.com
Twitter: https://twitter.com/joegrand
Special thanks to:
wallet.fail: https://wallet.fail
Colin O'Flynn: https://twitter.com/colinoflynn
NewAE Technology: https://newae.com
Macdonald Entertainment Partners: https://macdonaldentertainmentpartners.com
Chase McDaniel: https://www.mercuryroadmedia.com
Dan Reich: https://danreich.com/i-had-2-million-dollars-in-crypto-locked-on-a-wallet
ABOUT OFFSPEC.IO
offspec.io (https://offspec.io) is a dedicated team of hackers and entrepreneurs specializing in password recovery from hardware and software wallets. We're always looking for new and interesting projects where we can use our skills to help others.
- published: 24 Jan 2022
- views: 8409532