Remove Firmware Remove Hacking Remove InfoSec Remove Passwords
article thumbnail

[Full-Disclosure] HideezKey 2 FAIL: How a good idea turns into a SPF (Security Product Failure)

Security Affairs

HideezKey- This is a deep-dive into a nice concept for a security token & password manager that turned into a horrible product due to lack of proper R&D and Threat Modeling. Passive Recon & OSINT: First of all (even without attempting to open the token) we can immediately notice our best-hardware-hacking-friend: the FCC ID.

Firmware 101
article thumbnail

Hacking IoT devices with Focaccia-Board: A Multipurpose Breakout Board to hack hardware in a clean and easy way!

Security Affairs

Successfully dumped the smartlock’s firmware. And after having successfully dumped the firmware we can proceed at extracting some valuable evidences for the forensics case. Artifacts extracted from the FW analysis: Smartlock Passwords & User’s Logs. But it saves my time while hacking (I)IoT targets.

IoT 84
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Like any other criminal hack. It’s about challenging our expectations about the people who hack for a living. A village is like a mini conference within a larger conference and it is not just at DEF CON, ICS village is also at RSAC, Hack the Capital, AvergerCon, BSides, and many more.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. They invited us and other members of the public to try to hack it. The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. There were PDFs of Election Day passwords that supervisors use to start in elections. Apple Podcasts.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. They invited us and other members of the public to try to hack it. The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. There were PDFs of Election Day passwords that supervisors use to start in elections. Apple Podcasts.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. They invited us and other members of the public to try to hack it. The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. There were PDFs of Election Day passwords that supervisors use to start in elections. Apple Podcasts.

Hacking 40