Archive | Hardware Hacking


18 October 2010 | 10,016 views

USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files

PoC to generate Reverse TCP backdoors (x86, x64, all ports), running Autorun or LNK USB infections, but also dumping all USB files remotely on multiple targets at the same time. USBsploit works through Meterpreter sessions with a light (27MB) modified version of Metasploit. The interface is a mod of SET (The Social Engineering Toolkit). The [...]

Continue Reading


29 September 2010 | 7,427 views

JailBreaking AppleTV Running on iOS 4.1 – iPad/iPhone 4 Jailbreak Soon?

Posts about the latest Jailbreak exploit/software for the new Apple devices are always pretty popular and this looks like it might turn out to be pretty interesting. It seems like at the moment the latest iOS update has been cracked for iPod Touch and earlier iPhones (3GS) but there’s no working Jailbreak at the moment [...]

Continue Reading


02 August 2010 | 24,691 views

GSM Hacking Coming To The Masses Script Kiddy Style

Well it looks like what happened to WEP all those years ago is going to happen to GSM now. The methods have been known, the theory is established but the breaking point is when freely available tools are published that makes it possible for anyone to perform the attacks even without really understanding what is [...]

Continue Reading


30 July 2010 | 14,688 views

iKAT – Interactive Kiosk Attack Tool v3

iKAT was designed to aid security consultants with the task of auditing the security of a Windows based internet Kiosk terminal. iKAT is designed to provide access to the underlying operating system of a Kiosk terminal by invoking native OS functionality. This tool should be (and is) used by Kiosk vendors/developers/suppliers to test the security [...]

Continue Reading


29 June 2010 | 9,875 views

PwnageTool 4.01 Released – Jailbreak For iPhone & iPod Firmware 4.0 (iOS4)

The big news in the Apple-sphere recently was the released of iOS 4, which *shock&awe* has folders and multi-tasking – w00t. You can of course jailbreak it with the newly updated PwnageTool 4.01. On Monday, Apple released firmware 4.0 for the iPhone and iPod touch devices. This of course was a major upgrade. As advised, [...]

Continue Reading


25 May 2010 | 8,192 views

IBM Distributes Malware Laden USB Drives at AusCERT Security Conference

Another case of ‘accidental’ malware distribution, remember a while back when Vodafone Spain was Distributing Mariposa Malware, the latest is that IBM handed out malware laden USB drives at a security conference of all places. Well on the up-side at least everyone there would be security savvy so damage should be minimal. If it was [...]

Continue Reading


06 May 2010 | 10,043 views

Untethered Userland Jailbreak For iPhone 3.1.3 & iPad 3.2 Has Arrived

It’s been a long time since we’ve covered any kind of Jailbreak apps, although we did cover some stories where owners of jailbroken devices were getting pwned by Rickrolling followed up shortly after with a malicious version of the worm. I thought I’d cover this anyway as the iPad seems to be ‘the next big [...]

Continue Reading


01 April 2010 | 17,517 views

Open Source Keykeriki Captures Wireless Keyboard Traffic

Another interesting attack, rather than going after the PC/Server this one goes after the data sent by wireless devices such as the wireless keyboards sold by Microsoft. The neat thing is by using a replay attack you could also send rogue inputs to the device. But then it serves Microsoft right for using XOR encryption [...]

Continue Reading


18 March 2010 | 5,017 views

Vodafone Spain Distributing Mariposa Malware

Just a week after supplying an infected Android phone to a worker at Panda Security, Vodafone Spain has once again managed to pass out a malware infected HTC Magic phone to a researcher at S21Sec. The write-up on the Panda Research Blog, including technical analysis of the infector can be found here: Vodafone distributes Mariposa [...]

Continue Reading


05 March 2010 | 10,212 views

Boffins Crack OpenSSL Library Using Power Fluctuations

Now this is a very interesting technique, as far as I know I’ve not seen anything similar to this before. It’s like a rather bizarre meld of hardware hacking and software exploitation using cryptographic algorithm cracking techniques. Some rather smart fellas have found a way to extract the private SSL key from a device by [...]

Continue Reading