by Doc | May 19, 2023 | Pages
Warning Messasge http://www.wallofsheep.com/pages/05c28a34e2eeeefaeeca2e6796a06ae572f4814e3c5c592652468da5a9c2a55e The invariable problem with new technologies is the potential for new attack vectors. Near Field Communication (NFC) is gaining momentum as an added...
by Doc | May 19, 2023 | Pages
Concepts – USB as a charge port The concept is simple, leading smart phones on the market have been designed to utilize the same port for charging the phone as data transfer. This opens the opportunity to trick a user in need of a charge to expose their...
by Doc | May 19, 2023 | Pages
by Doc | May 19, 2023 | Pages
For those of you that are or have ever been interested in bypassing tamper evident and tamper proof technologies, we have assembled a few resources to get you started. Introduction to Tamper Evident Devices by: Datagram (52 Minute Talk from Defcon 19) How to hack a...
by Doc | May 19, 2023 | Pages
Getting Started There are three major components of Project Ubertooth: hardware: The hardware design of Ubertooth One is quite stable. firmware: This is software that executes on the ARM processor on the Ubertooth One itself. This page assumes that you have the USB...
by Doc | May 19, 2023 | Pages
Ubertooth...