article thumbnail

[Full-Disclosure] HideezKey 2 FAIL: How a good idea turns into a SPF (Security Product Failure)

Security Affairs

This will help me later in the case I will be able to obtain a firmware that eventually is encrypted (i.e. Just to be 100% sure I won’t fry the board while attempting the firmware dump, I double-checked with the multimeter that the pinout of the SWD interface was still correct. known-plaintext attack). And indeed it was!

Firmware 101
article thumbnail

USBsamurai for Dummies: How To Make a Malicious USB Implant & Bypass Air-Gapped Environments for 10$. The Dumb-Proof Guide.

Security Affairs

With this article I wanna bring more light regarding: Which are the differences between C-U0007 & C-U0012 How to Build USBsamurai with a C-U0012 How to flash the C-U0012 with the LIGHTSPEED Firmware How to Flash the C-U0007 with the G700 firmware to achieve better performances and get the Air-Gap Bypass feature How to setup LOGITacker.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. Again, all all around the InfoSec community.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. I’m talking about the totality of the voting system.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. I’m talking about the totality of the voting system.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. You want to make sure the devices used are hardened, they don’t have unnecessary outside access, that they are kept up-to-date with their software, firmware, etc. I’m talking about the totality of the voting system.

Hacking 40
article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. ” So should analyzing a device’s firmware for security flaws be considered illegal?

InfoSec 52