by Doc | May 19, 2023 | Pages
Concepts – USB as a charge port The concept is simple, leading smart phones on the market have been designed to utilize the same port for charging the phone as data transfer. This opens the opportunity to trick a user in need of a charge to expose their...
by Doc | May 19, 2023 | Pages
by Doc | May 19, 2023 | Pages
For those of you that are or have ever been interested in bypassing tamper evident and tamper proof technologies, we have assembled a few resources to get you started. Introduction to Tamper Evident Devices by: Datagram (52 Minute Talk from Defcon 19) How to hack a...
by Doc | May 19, 2023 | Pages
Getting Started There are three major components of Project Ubertooth: hardware: The hardware design of Ubertooth One is quite stable. firmware: This is software that executes on the ARM processor on the Ubertooth One itself. This page assumes that you have the USB...
by Doc | May 19, 2023 | Pages
Ubertooth...
by Doc | May 19, 2023 | Pages
How to install Wireshark on Windows 7 How DHCP works How a network switch works How a Traceroute works ngrep Tutorial – NOTE: There is music in the background of this video.. You may want to turn your sound down. dsniff Tutorial – NOTE: There is music in...