Archive | Hardware Hacking




Intel Hidden Management Engine – x86 Security Risk?

So it seems the latest generation of Intel x86 CPUs have implemented a Intel hidden management engine that cannot be audited or examined. We can also assume at some point it will be compromised and security researchers are labelling this as a Ring -3 level vulnerability. This isn’t a new issue though, people have been […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

Fitbit Vulnerability Means Your Tracker Could Spread Malware

So it seems there is a Fitbit vulnerability involving the BlueTooth implementation that can be used to embed self replicating malware onto the wearable fitness tracker. I actually own a Fitbit, and have had previous models too, so this is quite interesting to me. The malware could spread to your PC/Laptop if you’re using the […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking, Malware | Add a Comment

Kid Gets Arrested For Building A Clock – World Goes NUTS

So, today we have a tale of the fabled American knee-jerk reaction, this time to a 14 year old Muslim boy who made a cool clock and brought it to school. He got arrested, cuffed and fingerprinted – over a science project. Yah, arrested for building a clock. That seems like a slightly harsh reaction, […]

Tags: , , , , , , ,

Posted in: General Hacking, Hardware Hacking | Add a Comment

The Jeep HACK – What You Need To Know

So yah, the big news this week everyone is shouting about is about the Fiat Chrysler Automobiles (FCA) owned Jeep Hack involving the new Cherokee which has remote control software which allows access to the engine, aircon, audio system and brakes – basically the whole car can be controlled remotely as long as you know […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

Rowhammer – DDR3 Exploit – What You Need To Know

So the big news this week was the release of details of a very clever hardware attack posted by Google’s Project Zero security initiative called Rowhammer. The impressive part is this is a hardware/manufacturing bug that has elevated to a software based attack. In simple terms Rowhammer is an attack that exploits physical weaknesses in […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

SnoopyPro – Windows USB Sniffer Tool

SnoopyPro is a lightweight, standalone (no installation necessary) USB sniffer tool, it will log all data exchange between USB Device and its driver under a Windows environment. It definitely works on Windows XP, unsure about newer versions. SnoopyPro allows you to intercept, display, record and analyze USB protocol and all the data transferred between any […]

Tags: , , , , , , , , ,

Posted in: Hardware Hacking, Windows Hacking | Add a Comment

ATM Hacked Using Samsung Galaxy S4 & USB Port

A pretty interesting black box daughter board attack on ATM via USB, the crowd cry ATM Hacked! Yah it was, and it was triggered using a mobile phone to actually activate the attack, showing it’s fairly complex and also abstracting the actual attacker from being physically there. The guy carrying the black box can’t actually […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

Hacking Your Fridge – Internet of Things Security

So one of the latest fads is IoT or the Internet of things phenomena which has been talked about for a while (especially since the discussion of IPv6 started), IoT is connecting physical items to the Internet and giving them some kind of IP (be in NAT or a proper IPv6 address). This enabled you […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

Hackers Recreate NSA Snooping Kit Using Off-the-shelf Parts

So some curious hardware hackers grabbed the leaked catalogue that detailed the hardware involved in the NSA Snooping Kit, and have recreated some of the ‘high-tech’ top secret tools with off-the-shelf parts and items that can be bought from Kickstarter. I mean some of it seems pretty simplistic though, a monitor mirror and a hardware […]

Tags: , , , , , , , , , , ,

Posted in: Hardware Hacking, Privacy | Add a Comment

SHODAN – Expose Online Devices (Wind Turbines, Power Plants & More!)

SHODAN is a search engine that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some have also described it as a public port scan directory or a search engine of banners. Web search engines, such as Google and Bing, are great for finding websites. But what if you’re interested in […]

Tags: , , , , , ,

Posted in: Hacking Tools, Hardware Hacking, Privacy | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·