Archive | Hardware Hacking

Advertisements


16 August 2007 | 6,833 views

German Hacker Successfully Clones E-Passports

So the latest news is that the RFID chips in electronically enabled passports are NOT encrypted, which bright spark came up with that idea? Ok so you implement ‘more secure’ RFID passports, and leave all the data in plain text for anyone to tamper with – nice! So what do you think they are gonna […]

Continue Reading


18 July 2007 | 9,616 views

Intel Core 2 Duo Vulnerabilities Serious say Theo de Raadt

The scariest type of all, hardware vulnerabilities. Security guru and creator of OpenBSD Theo de Raadt recently announced he had found some fairly serious bugs in the hardware architecture of Intel Core 2 Duo processors. He goes as far as saying avoid buying a C2D processor until these problems are fixed. A prominent software developer […]

Continue Reading


11 April 2007 | 14,461 views

Legal to Unlock Cell Phones Since November 2006

As with the UK, many phones in the US are sold under contract and are given at very discounted rates or even free in some cases if you sign a contract for year withe service provider. Before that it was illegal to unlock your phone but finally in November 2006 it came out in court […]

Continue Reading


29 January 2007 | 15,892 views

Hacking your $60 Router into a $600 Router

This is a bit of hacking in the original sense of the word, taking a $60 router and giving it the capabilities of something costing in the hundreds or thousands (enterprise level). Of all the great DIY projects at this year’s Maker Faire, the one project that really caught my eye involved converting a regular […]

Continue Reading


13 September 2006 | 19,569 views

Using the capture command in a Cisco Systems PIX firewall.

This is an excellent article you might find useful covering the use of the capture command in Cisco PIX firewalls. A vital tool to use when troubleshooting computer networking problems and monitoring computer networks is a packet sniffer. That being said, one of the best methods to use when troubleshooting connection problems or monitoring suspicious […]

Continue Reading


23 August 2006 | 4,677 views

libtiff Vulnerability gives hope for a new GTA-less PSP exploit

QJ.net forums have been abuzz lately with the talk of a possible new exploit centered around a libtiff vulnerability. NOPx86 stating that he’d managed to crash the PSP using this method. As those of you who follow these things know, a crash doesn’t always mean an open door to an exploit. But after a cumulative […]

Continue Reading


05 July 2006 | 3,434 views

Veterans Administration Chief Says Laptop Recovered

Ah, so finally they got it back, from a street corner of all places. Let’s hope they shall be a little more careful in the future yah? The missing laptop and hard drive that contained veterans’ personal information has been found, Veterans Administration Chief Jim Nicholson announced Thursday. The announcement came at the beginning of […]

Continue Reading


26 June 2006 | 5,080 views

US Veterans Information Leaked on The Web

Another HUGE information leak from the US government, seems they can’t help themselves. Or perhaps people are just ramping up the efforts against them.. The Navy has begun a criminal investigation after Social Security numbers and other personal data for 28,000 sailors and family members were found on a civilian website. The Navy said Friday […]

Continue Reading


23 June 2006 | 13,238 views

Researchers hack Wi-Fi driver to breach laptop

Ah another way to exploit wifi, what a surprise! Security researchers have found a way to seize control of a laptop computer by manipulating buggy code in the system’s wireless device driver. The hack will be demonstrated at the upcoming Black Hat USA 2006 conference during a presentation by David Maynor, a research engineer with […]

Continue Reading


02 June 2006 | 10,917 views

THC Releases Nokia Phone ROM Images

I have to agree with their sentiment, I’m all for open hardware standards. Even if you don’t open it, people will copy it anyway (See the mass of Cisco knock-offs in China for a fraction of the price with almost exactly the same functions and IOS) So why not open it, let us play with […]

Continue Reading


Advertisements