DoublePulsar Initial SMB Backdoor Ring 0 Shellcode Analysis

@tachyeonz : One week ago today, the Shadow Brokers (an unknown hacking entity) leaked the Equation Group’s (NSA) FuzzBunch software, an exploitation framework similar to Metasploit.

Read More

Connect On:
Twitter :@tachyeonz

Farmers Look For Ways To Circumvent Tractor Software Locks

@tachyeonz : A new tractor often costs hundreds of thousands of dollars, but one thing not included in that price is the right to repair it. That has put farmers on the front lines of a battle pitting consumers against the makers of all kinds of consumer goods, from tractors to refrigerators to smartphones.

Read More

Connect On:
Twitter :@tachyeonz

Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware

@tachyeonz : To avoid the draconian locks that John Deere puts on the tractors they buy, farmers throughout America’s heartland have started hacking their equipment with firmware that’s cracked in Eastern Europe and traded on invite-only, paid online forums.

Read More

Connect On:
Twitter :@tachyeonz

IoT and IIOT Cybersecurity Market Map

@tachyeonz : CB Insights has identified 78 private companies at the intersection of cybersecurity and connected hardware, which includes: critical infrastructure, mobile phones, connected devices, enterprise endpoints, and connected cars.

Read More

Connect On:
Twitter :@tachyeonz

Applied Machine Learning for Data Exfil and Other Fun Topics

@tachyeonz : by Matt Wolff & Brian Wallace & Xuan ZhaoMachine learning techniques have been gaining significant traction in a variety of industries in recent years, and the security industry is no exception to it’s influence. These techniques, when applied correctly, can help assist in many data driven tasks

Read More

Connect On:
Twitter :@tachyeonz

Hacking industrial vehicles from the internet

@tachyeonz : It is possible to monitor and control float trucks, public bus or delivery vans from the internet, obtaining their speed, position, and a lot other parameters. You can even control some parameters of the vehicle or hack into the canbus of the vehicle remotely.

Read More

Connect On:
Twitter :@tachyeonz

Researchers Create Undetectable Rootkit That Targets Industrial Equipment

@tachyeonz : Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all over the world.

Read More

Connect On:
Twitter :@tachyeonz

How to get free wifi on public networks

@tachyeonz : This short tutorial describes a few methods for gaining access to the Internet, a basic human right, from public wireless networks. This tutorial has been tested on Mac, should work on Linux, and hasn’t been tested on Windows.

Read More

Connect On:
Twitter :@tachyeonz

Forth: The Hacker’s Language

@tachyeonz : Let’s start right off with a controversial claim: Forth is the hacker’s programming language. Coding in Forth is a little bit like writing assembly language, interactively, for a strange CPU architecture that doesn’t exist.

Read More

Connect On:
Twitter :@tachyeonz

A practical guide to RFID badge copying

@tachyeonz : During red teaming assignments we are sporadically asked to attempt to gain access to certain physical “flags”. These flags could be the inside of a server room, or the workstation of a member of the management team.

Read More

Connect On:
Twitter :@tachyeonz

Some autonomous cars will avoid being hacked by simply staying off the Internet

@tachyeonz : Self-driving cars are essentially large computers on wheels. No surprise, then, that some of them will be kept offline in the name of security.

Read More

Connect On:
Twitter :@tachyeonz

The Introductory IoT Hardware Hacking Tool Box

@tachyeonz : Aggregated here you will find some of the most popular tools for reverse engineering embedded electronics, as well as some documentation and tutorials on how to get started using them.

More

Published On:January 07, 2017 at 05:04AM

Connect On:
Medium : http://www.medium.com/iiot
Twitter :@tachyeonz