Yubi.png

Yubikey, The Weaponization Thereof

The Weaponization of Yubikey - A Primer..., or, Why (Oh Why) Did I Take The Attractive Golden Key Shaped Device At That Trade Show? via Michael Allen, writing over at the fascinating ...

Shmoocon 2019, Falcon Darkstar’s ‘Looking For Malicious Hardware Implants With Minimal Equipment’

Source Credit: Shmoo Con 2019 at Archive.org, also available at 0xdade's YouTube Channel. Enjoy! Permalink ...

ZeroNights 2018, Eric Sesterhenn’s, Luis Merino’s, Markus Vervier’s ‘Zero Fax Given’

From The Video Description: FAX machines, although being a reminiscent of a not-so-far past, are still present in lots of office spaces and can be frequently used for business and legal communications ...

ZeroNights 2018, HC Ma’s ‘Massive Scale USB Device Driver Fuzz WITHOUT Device’

From the Video Description: USB is one of the most common interfaces supported on modern computers. Modern OSes offer tons of USB drivers to support frequently used USB device classes. For other ...

ZeroNights 2018, Alexandre Gazet’s, Fabien (0xf4b) Perigaud’s & Joffrey (@_Sn0rkY) Czarny’s ‘Turning Your BMC Into A Revolving Door’

From The Video Description: "Unmonitored and unpatched BMC (remote administration hardware feature for servers) are an almost certain source of chaos. They have the potential to completely undermined the security of complex ...
Time To Stop: More Intel Tomfoolery Discovered

Time To Stop: More Intel Tomfoolery Discovered

Another chip-based flaw has now reared it's miniscule silicon noggin over Intel-way. Pro Tip: It would be wise to perform adequate security testing on these products before unleashing them on the world, ...
Guarding Against Backdoors and Malicious Hardware

Guarding Against Backdoors and Malicious Hardware

In a post-Supermicro-scoop world, it’s important for security teams to review the basics on detecting and guarding against hardware backdoors. Malicious software is relatively easy to find, but what if your actual ...
Security Boulevard
Loading...