background preloader

Hardware & IRL

Facebook Twitter

After burglaries, mystery car unlocking device has police stumped. It's February, about an hour after midnight, and three men in oversized clothing and hats walk silently down a deserted residential street in Long Beach, California.

After burglaries, mystery car unlocking device has police stumped

Each one goes up to a car in the area, takes out a small electronic device, and pulls on the passenger side car handle. The first man tries a car in the street. It doesn't open, and he walks on. The other two men try an Acura SUV and an Acura sedan in one home's driveway. Both of the cars unlock, their overhead lamps going on. Video of this scene was recorded by a surveillance camera placed in the driveway where the two Acuras were parked. In April, the Long Beach Police posted the surveillance video on YouTube , desperate to figure out just how the electronic device used by the three suspects works. Create and print secure tickets with barcodes or qr codes. Printing secure tickets or badges, which cannot be forged or copied, has never been easier and cheaper!

Create and print secure tickets with barcodes or qr codes

Just use the TicketCreator Barcode edition to create and print tickets with a unique barcode on each ticket. TicketCreator prints on each ticket a unique 10-digit number as a barcode, which is checked at the entrance with the BarcodeChecker software and a simple barcode scanner (USB or PS/2, starting at € 50,-/ $ 60,-/ £ 45,-), a webcam or an Android phone. Each barcode can only be used once to enter.

Therefore, copied or forged tickets are rejected and your revenues are protected. By default, the tickets are labeled with random numbers with 10digits, which serve as copy protection. Long Range WiFi Antennas USB Adapters Coaxial Cables and WiFi Tutorials. Long Range WiFi Antennas USB Adapters Coaxial Cables and WiFi Tutorials. DEF CON 21 Presentation By ZOZ - Hacking Driverles. DEFCON 20: Bypassing Endpoint Security for $20 or Less. Katy Levinson, Don't Fix It In Software, Defcon 19.

DEFCON 20: The Art Of The Con. Defcon 18 - Programmable HID USB keystroke Dongle - Adrian Crenshaw - Part.mov. Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box. Tomorrow at the Black Hat security conference in Las Vegas, the Pwnie Express will officially unleash Pwn Plug R2, the next generation in its arsenal of penetration testing and hacking hardware.

Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box

Ars got an exclusive rundown in advance on the device from Dave Porcello, founder and CEO of Pwnie Express. Power strip or network hacking tool? It’s both, actually. Pwnie Express drew a lot of attention earlier this year with its Pwn Plug, a stealthy, small computer loaded with network hacking tools disguised in an innocuous, white power brick that resembles an air freshener—albeit one with Ethernet and USB ports. Now, with funding from the Defense Advanced Research Projects Agency’s Cyber Fast Track program, the company has created an even stealthier tool for testing and cracking networks: one disguised as a power strip. The Power Pwn, now available for preorder, looks and works like a surge-protecting power strip, with eight functional 120 volt outlets. But it is also a Linux-based computer loaded with hacking software, including high-gain WiFi and Bluetooth antennas as well as dual Ethernet ports.

There's also an external 3G/GSM adapter that allows it to use cellular wireless networks. It can be preconfigured using a Web interface, and then casually swapped for the power strip on any computer on the network. Professor fools $80M superyacht’s GPS receiver on the high seas. One of the world’s foremost academic experts in GPS spoofing—University of Texas assistant professor Todd Humphreys—released a short video on Monday showing how he and his students deceived the GPS equipment aboard an expensive superyacht.

Professor fools $80M superyacht’s GPS receiver on the high seas

Humphreys conducted the test in the Ionian Sea in late June 2013 and early July 2013 with the full consent of the “White Rose of Drachs” yacht captain. His work shows just how vulnerable and relatively easy it is to send out a false GPS signal and trick the on-board receiver into believing it. “What we did was out in the open. It was against a live vehicle, a vessel—an $80 million superyacht, controlling it with a $2,000 box,” he told Ars. “This is unprecedented. Trusting iPhones plugged into bogus chargers get a dose of malware. Plugging your phone into a charger should be pretty safe to do.

Trusting iPhones plugged into bogus chargers get a dose of malware

It should fill your phone with electricity, not malware. But researchers from Georgia Institute of Technology have produced fake chargers they've named Mactans that do more than just charge your phone: they install custom, malicious applications onto iPhones. Their bogus chargers—which do, incidentally, charge the phone—contain small computers instead of mere transformers. Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box. Tomorrow at the Black Hat security conference in Las Vegas, the Pwnie Express will officially unleash Pwn Plug R2, the next generation in its arsenal of penetration testing and hacking hardware.

Pwned again: An exclusive look at Pwnie Express’ newest hack-in-a-box

Ars got an exclusive rundown in advance on the device from Dave Porcello, founder and CEO of Pwnie Express. Teensy USB Development Board. The Teensy is a complete USB-based microcontroller development system, in a very small footprint, capable of implementing many types of projects.

Teensy USB Development Board

All programming is done via the USB port. No special programmer is needed, only a standard "Mini-B" USB cable and a PC or Macintosh with a USB port. Update: Discussion / Support Forum Teensy 3.1 changes from Teensy 3.0. DEFCON 19: Hacking Victims Over Power Lines. Teensy USB Development Board. The Teensy is a complete USB-based microcontroller development system, in a very small footprint, capable of implementing many types of projects.

Teensy USB Development Board

All programming is done via the USB port. No special programmer is needed, only a standard "Mini-B" USB cable and a PC or Macintosh with a USB port. Update: Discussion / Support Forum Teensy 3.1 changes from Teensy 3.0. DEFCON 20: Hacker + Airplanes = No Good Can Come Of This. BONUS- BLACK HAT- Barnaby Jack - Jackpotting Automated Teller Machines Redux - Video.

IRL Keys

GSM. How to make a DIY home alarm system with a raspberry pi and a webcam. Step #1: Make your webcam stealth I wanted to hide the camera in an inconspicuous place outside my door, so I removed the webcam’s casing.

How to make a DIY home alarm system with a raspberry pi and a webcam

The Pen Test Drop Box Distro for the Raspberry Pi. Pentesting Appliance – Pwnie Express. On-demand Security Assessments for Remote Sites and Branch Offices Pwnie Express provides innovative and easy-to-use security testing products for today’s distributed enterprises and their hard-to-reach branch offices.

Pentesting Appliance – Pwnie Express

Our products are designed for: Penetration Testers: You can easily assess your security on demand.Third Party Security Assessors: Easy anytime, anyplace access without associated travel costs that take you out of the office and away from other engagements for daysAuditing Professionals: Test and assess standard applications and custom web applications to expose security weaknesses It allows you to test all of the organization’s potential threat vectors, simply and rapidly demonstrating their vulnerabilities. Pwn Pad – Pwnie Express. Pwn Plug Elite – Pwnie Express. The industry’s first enterprise-class penetration testing drop box.

Through its innovative, patent-pending design, the Pwn Plug covers the entire spectrum of a full-scale pentesting engagement, from physical-layer to application-layer. Core Features: Includes all release 1.1 featuresIncludes 4G/GSM cellular, Wireless (802.11b/g/n), high-gain Bluetooth, & USB-Ethernet adaptersFully-automated NAC/802.1x/RADIUS bypass! Out-of-band SSH access over 4G/GSM cell networks! Text-to-Bash: text in bash commands via SMS! Hardware Specs: Processor / RAM: 1.2GHz ARM processor / 512MB SDRAMDisk storage: 512MB internal NAND disk + 16GB SD storage cardExternal Wireless: 802.11b/g/n, high-gain Bluetooth, 4G/GSM cellularExternal I/O: 1 onboard Gigabit Ethernet, 1 external 10/100 Ethernet, 1 USB 2.0, serial consoleVoltage: 110-240v (Adapters available)Power draw: 2.3 watts idle, 7 watts max CPUDimensions: 4.3 x 2.7 x 1.9 inches.

RFID

FareBot – Lire les cartes de transports NFC avec Android. Le NFC permet de prendre le train gratuitement. La technologie NFC, "Near Field Communication" ("Communication en champ proche"), fait ses débuts sur les smartphones les plus récents. Radio-frequency identification. Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects.

The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader and may be embedded in the tracked object. Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and people, the possibility of reading personally-linked information without consent has raised serious privacy concerns.[2] These concerns resulted in standard specifications development addressing privacy and security issues.

Recharger son passe Navigo de chez soi ! Tout parisien aura connu l'horreur du premier jour du mois, celui où il fait la queue à 8h du matin pour recharger son passe Navigo... Des capteurs de mouvement et température sans fil. Si vous êtes un accroc de la sécurité, ou simplement un bricoleur en manque de petits joujoux, les petits capteurs qui suivent devraient vous intéresser. Avec quelques uns de ces petits objets, votre maison devrait être en sécurité. Cerise sur le gâteau, vous pourriez même ne plus perdre vos clefs ni votre précieux téléphone. Hacker Opens High Security Handcuffs With 3D-Printed And Laser-Cut Keys. Comment voler une BMW en moins de 3 minutes. Comment voler une BMW en moins de 3 minutes Ah Ah ! Je ne suis pas vraiment sûr que les clés sans contact ce soit une si bonne idée, et encore moins avec les voitures... Le piratage de drones américains relance les débats.

Les drones, ces appareils volants commandés à distance, prennent petit à petit place dans notre société. Qu'ils soient de simples gadgets ou véritables machines de guerre, ils restent vulnérables au piratage. Se pose alors la question de leur utilisation. Il y a quelques semaines, un groupe de chercheurs de l’Université du Texas a démontré, devant tout un parterre de militaires et autres officiels du gouvernement américains, comment un pirate pouvait prendre le contrôle total d’un drone en exercice dans l’espace aérien du pays. Commercial Drones and GPS Spoofers a Bad Mix. Researchers at the University of Texas at Austin Radionavigation Laboratory have successfully demonstrated that a drone with an unencrypted GPS system can be taken over by a person wielding a GPS spoofing device. You can see a video accompanying a Fox News story on it, as well as a video here of an experiment conducted by the researchers, led by Professor Todd Humphreys.

Humphreys and company were recently invited by the U.S. Department of Homeland Security (DHS) to demonstrate whether their capability to successfully spoof commercial GPS systems in the laboratory could work in the field. Les imprimantes 3D : un véritable problème pour les constructeurs de menottes. Des hackers volent une BMW sans clé en 180 secondes. N'allons pas faire de ce cas une généralité. Mais il n'empêche que des hackers ont mis au point un stratagème leur permettant de voler certains modèles de BMW en quelques minutes seulement. La chose n'est certainement pas nouvelle, mais il est de bon ton de la souligner : BMW est actuellement en proie à une bien mauvaise publicité, la faute à des voleurs bien équipés.

Trop bien équipés même, puisque ces derniers sont désormais en mesure de voler certains modèles de BMW en quelques minutes seulement, et ce sans activer l'alarme anti-vol, et encore moins le système d'immobilisation. Pour autant, difficile d'incriminer BMW, puisque c'est là une grande partie de l'industrie automobile qui se voit concernée par ce problème.

Une porte dérobée dans le matériel militaire. Le domaine militaire est ultra sécurisé et c’est tant mieux. Des tags NFC programmables pour Samsung. CrackingCreditCode.jpg (Image JPEG, 600x1708 pixels) How To Win Over Your Boss. How to Turn Your Webcam Into a Streaming, Motion-Detecting Surveillance System. L’écran spécial vie privée. At Turntable.fm, SMS texts, not keys, open doors. - Shareables. Cammster Uses Your Browser and Webcam For Motion-Sensitive Home Security. Hacking from the sky with the W.A.S.P - Part 1. DIY UAVs for Cyber Warfare – Wireless Aerial Surveillance Platform. Hack Attack: Turn your $60 router into a $600 router. Une caméra thermique pour dérober un code secret. Si vous êtes le genre de personne à cacher d'une main le clavier des distributeur de banque pour éviter qu'on vous pique votre code secret grâce à une petit caméra planquée dans un coin : bravo !

Mais cela ne suffit plus vraiment car des chercheurs ont mis au point une technique assez simple, je trouve, à base de caméra thermique, qui permet simplement en filmant le clavier du DAB, de deviner le code utilisé par la personne qui vient juste de passer. Les touches utilisées emmagasinent de la chaleur, qui s'estompe de 80% après 10 secondes, à 60% après 45 secondes, ce qui permet directement de deviner l'ordre dans lequel ont été tapées les touches. La technique ne fonctionne pas avec des claviers en métal mais cartonne sur les claviers en plastique. Du coup, une caméra thermique planquée sera diablement efficace car une fois le code tapé, les gens qui cachent le clavier avec leur autre main, la retire, laissant apparaitre ces points de chaleur. Suffisait d'y penser. Livebox 2 Unlocker. How To Coke Machine Jackpot Hack - a News &Politics video.

How to hack a vending machine - a Sports et Extrême video. This Cheap Air Drone Can Break Into Your Computer and Own It. Lock Picking 101. Man In The Middle Attack - Ethical Hacking Example. Q&A: New Fraud and Identity Theft Rules. SELECTRONIC : Composants Electroniques, Systèmes d’Alarme, Matériel Electronique. A Crimping Tool For Making Your Own Speaker Wire. OpenPCR – Du biohacking open source.