Archive | Hardware Hacking


06 January 2011 | 18,409 views

Researchers Hack Mobile Calls On GSM Network

Gotta love a bit of hardware hacking in the new year, this Karsten Nohl guy has been busy lately – he recently exposed Car Immobilisers Using Weak Encryption Schemes and more relevant to this article we’ve written about him and GSM Hacking Coming To The Masses Script Kiddy Style before. This kind of GSM snooping [...]

Continue Reading


23 December 2010 | 13,526 views

Car Immobilisers Using Weak Encryption Schemes

Another case of a certain industry lagging behind, I mean come-on – who seriously still using proprietary cryptography algorithms in 2010? Especially only 40 or 48-bit protocols, with the processing power available on hand now and new techniques like GPU based cracking – that just doesn’t cut it. The latest discovery of such implementations was [...]

Continue Reading


08 November 2010 | 7,913 views

Researcher Releases Android Exploit In Webkit Browser Engine

And Android security hits the news once again, it’s not a vulnerability in the OS per-say but rather in the browser based on the Webkit engine. It does highlight the inherent fragmentation problems with the Android platform and the security concerns that come with running old OS and software versions. It’s a problem that is [...]

Continue Reading


03 November 2010 | 11,633 views

GNS3 – Graphical Network Simulator

GGNS3 is a graphical network simulator that allows simulation of complex networks. It’s an excellent complementary tool to real labs for network engineers, administrators and people wanting to pass certifications such as CCNA, CCNP, CCIP, CCIE, JNCIA, JNCIS, JNCIE. It can also be used to experiment features of Cisco IOS, Juniper JunOS or to check [...]

Continue Reading


18 October 2010 | 10,040 views

USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files

PoC to generate Reverse TCP backdoors (x86, x64, all ports), running Autorun or LNK USB infections, but also dumping all USB files remotely on multiple targets at the same time. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET (The Social Engineering Toolkit). The [...]

Continue Reading


29 September 2010 | 7,430 views

JailBreaking AppleTV Running on iOS 4.1 – iPad/iPhone 4 Jailbreak Soon?

Posts about the latest Jailbreak exploit/software for the new Apple devices are always pretty popular and this looks like it might turn out to be pretty interesting. It seems like at the moment the latest iOS update has been cracked for iPod Touch and earlier iPhones (3GS) but there’s no working Jailbreak at the moment [...]

Continue Reading


02 August 2010 | 24,955 views

GSM Hacking Coming To The Masses Script Kiddy Style

Well it looks like what happened to WEP all those years ago is going to happen to GSM now. The methods have been known, the theory is established but the breaking point is when freely available tools are published that makes it possible for anyone to perform the attacks even without really understanding what is [...]

Continue Reading


30 July 2010 | 14,958 views

iKAT – Interactive Kiosk Attack Tool v3

iKAT was designed to aid security consultants with the task of auditing the security of a Windows based internet Kiosk terminal. iKAT is designed to provide access to the underlying operating system of a Kiosk terminal by invoking native OS functionality. This tool should be (and is) used by Kiosk vendors/developers/suppliers to test the security [...]

Continue Reading


29 June 2010 | 9,883 views

PwnageTool 4.01 Released – Jailbreak For iPhone & iPod Firmware 4.0 (iOS4)

The big news in the Apple-sphere recently was the released of iOS 4, which *shock&awe* has folders and multi-tasking – w00t. You can of course jailbreak it with the newly updated PwnageTool 4.01. On Monday, Apple released firmware 4.0 for the iPhone and iPod touch devices. This of course was a major upgrade. As advised, [...]

Continue Reading


25 May 2010 | 8,198 views

IBM Distributes Malware Laden USB Drives at AusCERT Security Conference

Another case of ‘accidental’ malware distribution, remember a while back when Vodafone Spain was Distributing Mariposa Malware, the latest is that IBM handed out malware laden USB drives at a security conference of all places. Well on the up-side at least everyone there would be security savvy so damage should be minimal. If it was [...]

Continue Reading