background preloader

Hardware & IRL

Facebook Twitter

After burglaries, mystery car unlocking device has police stumped. It's February, about an hour after midnight, and three men in oversized clothing and hats walk silently down a deserted residential street in Long Beach, California.

After burglaries, mystery car unlocking device has police stumped

Each one goes up to a car in the area, takes out a small electronic device, and pulls on the passenger side car handle. The first man tries a car in the street. It doesn't open, and he walks on. The other two men try an Acura SUV and an Acura sedan in one home's driveway. Both of the cars unlock, their overhead lamps going on. Video of this scene was recorded by a surveillance camera placed in the driveway where the two Acuras were parked. In April, the Long Beach Police posted the surveillance video on YouTube , desperate to figure out just how the electronic device used by the three suspects works. The Today Show 's Jeff Rossen also interviewed an Illinois man who has similar footage of a thief breaking into his Honda Accord using an electronic device, also from the passenger side of the vehicle.

Create and print secure tickets with barcodes or qr codes. Printing secure tickets or badges, which cannot be forged or copied, has never been easier and cheaper!

Create and print secure tickets with barcodes or qr codes

Just use the TicketCreator Barcode edition to create and print tickets with a unique barcode on each ticket. TicketCreator prints on each ticket a unique 10-digit number as a barcode, which is checked at the entrance with the BarcodeChecker software and a simple barcode scanner (USB or PS/2, starting at € 50,-/ $ 60,-/ £ 45,-), a webcam or an Android phone. Each barcode can only be used once to enter.

Therefore, copied or forged tickets are rejected and your revenues are protected. By default, the tickets are labeled with random numbers with 10digits, which serve as copy protection. The barcodes can be printed as Code 2 of 5 interleaved, Code 39 or QR code. Long Range WiFi Antennas USB Adapters Coaxial Cables and WiFi Tutorials. Long Range WiFi Antennas USB Adapters Coaxial Cables and WiFi Tutorials. DEF CON 21 Presentation By ZOZ - Hacking Driverles. DEFCON 20: Bypassing Endpoint Security for $20 or Less.

Katy Levinson, Don't Fix It In Software, Defcon 19. DEFCON 20: The Art Of The Con. Defcon 18 - Programmable HID USB keystroke Dongle - Adrian Crenshaw - Part.mov. Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box. Tomorrow at the Black Hat security conference in Las Vegas, the Pwnie Express will officially unleash Pwn Plug R2, the next generation in its arsenal of penetration testing and hacking hardware.

Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box

Ars got an exclusive rundown in advance on the device from Dave Porcello, founder and CEO of Pwnie Express. Power strip or network hacking tool? It’s both, actually. Pwnie Express drew a lot of attention earlier this year with its Pwn Plug, a stealthy, small computer loaded with network hacking tools disguised in an innocuous, white power brick that resembles an air freshener—albeit one with Ethernet and USB ports. Now, with funding from the Defense Advanced Research Projects Agency’s Cyber Fast Track program, the company has created an even stealthier tool for testing and cracking networks: one disguised as a power strip.

The Power Pwn, now available for preorder, looks and works like a surge-protecting power strip, with eight functional 120 volt outlets. But it is also a Linux-based computer loaded with hacking software, including high-gain WiFi and Bluetooth antennas as well as dual Ethernet ports. Professor fools $80M superyacht’s GPS receiver on the high seas. One of the world’s foremost academic experts in GPS spoofing—University of Texas assistant professor Todd Humphreys—released a short video on Monday showing how he and his students deceived the GPS equipment aboard an expensive superyacht.

Professor fools $80M superyacht’s GPS receiver on the high seas

Humphreys conducted the test in the Ionian Sea in late June 2013 and early July 2013 with the full consent of the “White Rose of Drachs” yacht captain. His work shows just how vulnerable and relatively easy it is to send out a false GPS signal and trick the on-board receiver into believing it. “What we did was out in the open. It was against a live vehicle, a vessel—an $80 million superyacht, controlling it with a $2,000 box,” he told Ars. “This is unprecedented. In this case, Humphreys' student sent out the spoofed signal from onboard the ship itself. Trusting iPhones plugged into bogus chargers get a dose of malware.

Plugging your phone into a charger should be pretty safe to do.

Trusting iPhones plugged into bogus chargers get a dose of malware

It should fill your phone with electricity, not malware. But researchers from Georgia Institute of Technology have produced fake chargers they've named Mactans that do more than just charge your phone: they install custom, malicious applications onto iPhones. Their bogus chargers—which do, incidentally, charge the phone—contain small computers instead of mere transformers.

The iPhone treats these computers just as it does any other computer, but instead of just charging, it responds to USB commands. Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box. Tomorrow at the Black Hat security conference in Las Vegas, the Pwnie Express will officially unleash Pwn Plug R2, the next generation in its arsenal of penetration testing and hacking hardware.

Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box

Ars got an exclusive rundown in advance on the device from Dave Porcello, founder and CEO of Pwnie Express. Teensy USB Development Board. The Teensy is a complete USB-based microcontroller development system, in a very small footprint, capable of implementing many types of projects.

Teensy USB Development Board

All programming is done via the USB port. DEFCON 19: Hacking Victims Over Power Lines. Teensy USB Development Board. The Teensy is a complete USB-based microcontroller development system, in a very small footprint, capable of implementing many types of projects.

Teensy USB Development Board

All programming is done via the USB port. No special programmer is needed, only a standard "Mini-B" USB cable and a PC or Macintosh with a USB port. Update: Discussion / Support Forum Teensy 3.1 changes from Teensy 3.0 Teensy Loader Application Software Development Tools. DEFCON 20: Hacker + Airplanes = No Good Can Come Of This. BONUS- BLACK HAT- Barnaby Jack - Jackpotting Automated Teller Machines Redux - Video.

IRL Keys

GSM. How to make a DIY home alarm system with a raspberry pi and a webcam. Step #1: Make your webcam stealth I wanted to hide the camera in an inconspicuous place outside my door, so I removed the webcam’s casing.

How to make a DIY home alarm system with a raspberry pi and a webcam

The Logitech C270 is a really good choice for this project as (1) it is 100% compatible with pi, (2) it has a really good 720p HD resolution and (3) it is very very small. Here’s how to make the camera ‘stealthy’: You can now connect your webcam to the usb hub. You have to use an external usb hub with an independent power supply as the raspberry pi cannot power the webcam by itself. I ended up hiding the webcam within the door (!) The Pen Test Drop Box Distro for the Raspberry Pi. Pentesting Appliance – Pwnie Express. Pwn Pad – Pwnie Express. Pwn Plug Elite – Pwnie Express. The industry’s first enterprise-class penetration testing drop box.

Pwn Plug Elite – Pwnie Express

Through its innovative, patent-pending design, the Pwn Plug covers the entire spectrum of a full-scale pentesting engagement, from physical-layer to application-layer. Core Features: Includes all release 1.1 featuresIncludes 4G/GSM cellular, Wireless (802.11b/g/n), high-gain Bluetooth, & USB-Ethernet adaptersFully-automated NAC/802.1x/RADIUS bypass!

RFID

FareBot – Lire les cartes de transports NFC avec Android. Le NFC permet de prendre le train gratuitement. La technologie NFC, "Near Field Communication" ("Communication en champ proche"), fait ses débuts sur les smartphones les plus récents. Radio-frequency identification. Small RFID chip, here compared to a grain of rice, is incorporated in consumer products, and implanted in pets, for identification purposes Radio-frequency identification (RFID) is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects.

The tags contain electronically stored information. Some tags are powered by and read at short ranges (a few meters) via magnetic fields (electromagnetic induction). Recharger son passe Navigo de chez soi ! Tout parisien aura connu l'horreur du premier jour du mois, celui où il fait la queue à 8h du matin pour recharger son passe Navigo... Des capteurs de mouvement et température sans fil. Si vous êtes un accroc de la sécurité, ou simplement un bricoleur en manque de petits joujoux, les petits capteurs qui suivent devraient vous intéresser. Avec quelques uns de ces petits objets, votre maison devrait être en sécurité. Cerise sur le gâteau, vous pourriez même ne plus perdre vos clefs ni votre précieux téléphone. Hacker Opens High Security Handcuffs With 3D-Printed And Laser-Cut Keys.

Comment voler une BMW en moins de 3 minutes. Comment voler une BMW en moins de 3 minutes Ah Ah ! Je ne suis pas vraiment sûr que les clés sans contact ce soit une si bonne idée, et encore moins avec les voitures... Par exemple sur les dernières BMW, grâce à un petit hack utilisant le port ODB (On Board Diagnostic), il est possible de programmer une nouvelle "clé" en un rien de temps et hop, vous pouvez dire bye bye à votre voiture. Et évidemment, certains ont vite compris le truc... Le piratage de drones américains relance les débats. Les drones, ces appareils volants commandés à distance, prennent petit à petit place dans notre société. Qu'ils soient de simples gadgets ou véritables machines de guerre, ils restent vulnérables au piratage. Se pose alors la question de leur utilisation.

Commercial Drones and GPS Spoofers a Bad Mix. Researchers at the University of Texas at Austin Radionavigation Laboratory have successfully demonstrated that a drone with an unencrypted GPS system can be taken over by a person wielding a GPS spoofing device. You can see a video accompanying a Fox News story on it, as well as a video here of an experiment conducted by the researchers, led by Professor Todd Humphreys. Humphreys and company were recently invited by the U.S. Department of Homeland Security (DHS) to demonstrate whether their capability to successfully spoof commercial GPS systems in the laboratory could work in the field. Les imprimantes 3D : un véritable problème pour les constructeurs de menottes. Des hackers volent une BMW sans clé en 180 secondes. N'allons pas faire de ce cas une généralité. Mais il n'empêche que des hackers ont mis au point un stratagème leur permettant de voler certains modèles de BMW en quelques minutes seulement.

La chose n'est certainement pas nouvelle, mais il est de bon ton de la souligner : BMW est actuellement en proie à une bien mauvaise publicité, la faute à des voleurs bien équipés. Trop bien équipés même, puisque ces derniers sont désormais en mesure de voler certains modèles de BMW en quelques minutes seulement, et ce sans activer l'alarme anti-vol, et encore moins le système d'immobilisation. Pour autant, difficile d'incriminer BMW, puisque c'est là une grande partie de l'industrie automobile qui se voit concernée par ce problème. Une porte dérobée dans le matériel militaire. Le domaine militaire est ultra sécurisé et c’est tant mieux. Mais s’il l’est tant au niveau logiciel, il l’est peut-être moins quand on plonge dans les composants des missiles ou des bombes nucléaires...

Sergei Skorobogatov, un chercheur de Cambridge, vient de publier un rapport affirmant que de nombreux appareils militaires, des systèmes d’armement aux centres nucléaires, pourraient être compromis à cause de la présence d’un composant bien particulier: le FPGA. Des tags NFC programmables pour Samsung. CrackingCreditCode.jpg (Image JPEG, 600x1708 pixels) How To Win Over Your Boss. How to Turn Your Webcam Into a Streaming, Motion-Detecting Surveillance System. L’écran spécial vie privée. At Turntable.fm, SMS texts, not keys, open doors. - Shareables. Cammster Uses Your Browser and Webcam For Motion-Sensitive Home Security.

Hacking from the sky with the W.A.S.P - Part 1. DIY UAVs for Cyber Warfare – Wireless Aerial Surveillance Platform. Hack Attack: Turn your $60 router into a $600 router. Une caméra thermique pour dérober un code secret. Livebox 2 Unlocker. How To Coke Machine Jackpot Hack - a News &Politics video. How to hack a vending machine - a Sports et Extrême video. This Cheap Air Drone Can Break Into Your Computer and Own It. Lock Picking 101.

Man In The Middle Attack - Ethical Hacking Example. Q&A: New Fraud and Identity Theft Rules. SELECTRONIC : Composants Electroniques, Systèmes d’Alarme, Matériel Electronique. A Crimping Tool For Making Your Own Speaker Wire. OpenPCR – Du biohacking open source.