Archive | Hardware Hacking




Caller ID Spoofing to be Made Illegal in the USA

The US Congress recently approved a bill that will make it illegal to spoof Caller ID in the USA. A while back the FCC announced the wanted to crack down on Caller ID spoofing as it was still too easy. The amount of the forfeiture penalty (…) shall not exceed $10,000 for each violation, or […]

Tags: , , , , , , , ,

Posted in: Hardware Hacking, Legal Issues | Add a Comment

German Hacker Successfully Clones E-Passports

So the latest news is that the RFID chips in electronically enabled passports are NOT encrypted, which bright spark came up with that idea? Ok so you implement ‘more secure’ RFID passports, and leave all the data in plain text for anyone to tamper with – nice! So what do you think they are gonna […]

Tags: , , , , , , ,

Posted in: Hardware Hacking, Legal Issues | Add a Comment

Intel Core 2 Duo Vulnerabilities Serious say Theo de Raadt

The scariest type of all, hardware vulnerabilities. Security guru and creator of OpenBSD Theo de Raadt recently announced he had found some fairly serious bugs in the hardware architecture of Intel Core 2 Duo processors. He goes as far as saying avoid buying a C2D processor until these problems are fixed. A prominent software developer […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking, UNIX Hacking | Add a Comment

Legal to Unlock Cell Phones Since November 2006

As with the UK, many phones in the US are sold under contract and are given at very discounted rates or even free in some cases if you sign a contract for year withe service provider. Before that it was illegal to unlock your phone but finally in November 2006 it came out in court […]

Tags: , , , , , ,

Posted in: Hardware Hacking, Legal Issues, Telecomms Hacking | Add a Comment

Hacking your $60 Router into a $600 Router

This is a bit of hacking in the original sense of the word, taking a $60 router and giving it the capabilities of something costing in the hundreds or thousands (enterprise level). Of all the great DIY projects at this year’s Maker Faire, the one project that really caught my eye involved converting a regular […]

Tags: , , , , , , , , , , ,

Posted in: Hardware Hacking, Linux Hacking, Network Hacking | Add a Comment

Using the capture command in a Cisco Systems PIX firewall.

This is an excellent article you might find useful covering the use of the capture command in Cisco PIX firewalls. A vital tool to use when troubleshooting computer networking problems and monitoring computer networks is a packet sniffer. That being said, one of the best methods to use when troubleshooting connection problems or monitoring suspicious […]

Tags: , , , , , , ,

Posted in: Countermeasures, Hardware Hacking, Network Hacking | Add a Comment

libtiff Vulnerability gives hope for a new GTA-less PSP exploit

QJ.net forums have been abuzz lately with the talk of a possible new exploit centered around a libtiff vulnerability. NOPx86 stating that he’d managed to crash the PSP using this method. As those of you who follow these things know, a crash doesn’t always mean an open door to an exploit. But after a cumulative […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

Veterans Administration Chief Says Laptop Recovered

Ah, so finally they got it back, from a street corner of all places. Let’s hope they shall be a little more careful in the future yah? The missing laptop and hard drive that contained veterans’ personal information has been found, Veterans Administration Chief Jim Nicholson announced Thursday. The announcement came at the beginning of […]

Tags: , , , , , , , , ,

Posted in: General News, Hardware Hacking | Add a Comment

US Veterans Information Leaked on The Web

Another HUGE information leak from the US government, seems they can’t help themselves. Or perhaps people are just ramping up the efforts against them.. The Navy has begun a criminal investigation after Social Security numbers and other personal data for 28,000 sailors and family members were found on a civilian website. The Navy said Friday […]

Tags: , , , , ,

Posted in: General News, Hardware Hacking, Social Engineering | Add a Comment

Researchers hack Wi-Fi driver to breach laptop

Ah another way to exploit wifi, what a surprise! Security researchers have found a way to seize control of a laptop computer by manipulating buggy code in the system’s wireless device driver. The hack will be demonstrated at the upcoming Black Hat USA 2006 conference during a presentation by David Maynor, a research engineer with […]

Tags: , , , , , , , , ,

Posted in: Hardware Hacking, Wireless Hacking | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·