Juice Jacking

Concepts – USB as a charge port The concept is simple, leading smart phones on the market have been designed to utilize the same port for charging the phone as data transfer. This opens the opportunity to trick a user in need of a charge to expose their...

Understanding & Bypassing Tamper Evident Devices

For those of you that are or have ever been interested in bypassing tamper evident and tamper proof technologies, we have assembled a few resources to get you started.  Introduction to Tamper Evident Devices by: Datagram  (52 Minute Talk from Defcon 19) How to hack a...

Ubertooth One Guide

Getting Started There are three major components of Project Ubertooth: hardware: The hardware design of Ubertooth One is quite stable. firmware: This is software that executes on the ARM processor on the Ubertooth One itself. This page assumes that you have the USB...

Videos

How to install Wireshark on Windows 7 How DHCP works How a network switch works How a Traceroute works ngrep Tutorial – NOTE: There is music in the background of this video.. You may want to turn your sound down. dsniff Tutorial – NOTE: There is music in...