Archive | Hardware Hacking

Advertisements


06 July 2009 | 49,515 views

Military Communications Hacking – Script Kiddy Style

Ah now this is interesting..and scary in a way. Script Kiddies with guns! Script kiddies going to war, or is it turning soldiers into script kiddies. Who knows. Anyway, the US military has decided to make their soldiers walking hackers, with an all-in-one super hacking device that can penetrate satellite signals, VoIP networks and normal […]

Continue Reading


12 May 2009 | 4,728 views

Ensuring Data Security During Hardware Disposal

After our recent story about the trading of BlackBerries for data theft the issue has emerged again this time more towards the secure disposal of data stored on PC hard disks. If a company or organisation has a decent data/information security policy in place (Like ISO27001 for example) they should have a secure destruction/disposal policy […]

Continue Reading


08 May 2009 | 10,679 views

Explosion Of BlackBerry Trading In Nigeria – Data Theft

The number of Crackberry Blackberry users is increasing exponentially – especially since they released the much sexier Bold and the latest touch-screen Storm. The latest revelation is that used BlackBerries are being traded, not by the value of the phone but by the value of the data contained on the phone! It just shows most […]

Continue Reading


28 April 2009 | 3,805 views

Industrial Control Systems Safe? I Think Not

It seems like there is some serious hacking going on, attacks on power stations and industrial control systems. You’d think most of these systems would be offline, or at least behind a solid DMZ. But as we’ve seen before they often get exposed by people plugging into the LAN then accessing the net through dial-up […]

Continue Reading


22 April 2009 | 7,110 views

EFIPW – Modify Apple EFI Firmware Passwords

EFIPW is a tool that can be used to decode and modify Apple EFI firmware passwords via the command line. It is designed after the non open source OFPW utility and is designed to work on Intel machines running Leopard or newer. Useful for lab deployments (setting the firmware password of machines as a post […]

Continue Reading


25 February 2009 | 7,409 views

Hackers Targeting Xbox Live Players with DoS Attacks

Well the day has come when money-minded botnet owners have turned their services towards online gaming. For a small fee (USD20) you can get someone to set you up with the software to ‘boot’ people from the Xbox Live network. It’s always been a problem in gaming, if something can get hold of your IP […]

Continue Reading


19 February 2009 | 25,575 views

Satellite Feed Hacking – Your Data Isn’t Private!

Hardware hacking is an interesting area and something not too many people get into as the soldering irons, capacitors and chipsets seem daunting. I did have a play around with cable boxes and satellite feeds in my earlier years and was surprised to find how insecure they were. Most traffic is transmitted unencrypted, the stuff […]

Continue Reading


06 February 2009 | 4,541 views

Cisco Enterprise Wireless (Wi-Fi) Equipment DoS Vulnerability Discovered

If your organisation is using any kind of Cisco Wi-Fi kit it may be time to get the latest patches for your kit. Although they state there is no proof that hackers have used this attack in the wild – in my experience if Cisco have discovered this now, someone else probably knew about it […]

Continue Reading


07 January 2009 | 7,516 views

Cisco Vulnerability Given ‘Write Once, Run Anywhere’ Treatement

This is an interesting development in router security, Cisco bugs have been popping up now and then – not that often – but usually when they do they are quite serious. The problem with them was you needed so many variations unless you were just targeting one specific router, with that specific version of IOS […]

Continue Reading


22 October 2008 | 17,615 views

Swiss Researchers Sniff Password from Wired Keyboard

Now this is an interesting twist on an oldschool method of hacking, the monitoring of electromagnetic radiation. You’d think it’d be easier to sniff the traffic from a wireless keyboard, but generally it’s not as they tend to be encrypted. Where as the electromagnetic radiation given off by a wired keyboard is not shielded or […]

Continue Reading


Advertisements