Post Author: Don C. WeberTwitter: @cutawayDate Published: 26 July 2013In May 2013 Jay Radcliffe decided that he wanted InGuardians to do something special for Black Hat USA 2013 and DefCon 21 and thus Sparring Board Version 1.2 – Raspberry Pi Edition (SBv1.2)...
This blog post is the sequel to Protecting the Mr Robot Vuln Hub Machine – Part 1 – Breaking a Password Spray with OSSEC Active Response. Attack: Uploading a Web Shell to Get User Daemon Let’s go back on the attack. Remember, we’ve got WordPress...
by Jay Beale (This post has a sequel.) I admit it — I haven’t been purely vacationing during my San Diego PTO. I’ve found particular intellectual joy in figuring out how to hack some of the CTF-type virtual machines from VulnHub. That led to looking through an answer...
Here at InGuardians, we are huge fans of the Tastic HiD card long-range reader. Designed and implemented by Bishop Fox, this long-range RFID reader allows us to silently and stealthily acquire sensitive data from things like employee badges, and has become a huge...
Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 15 Oct 2013 Many people think RfCat is a very cool concept. The thought of monitoring and interacting with sub-gigahertz radio is very sexy. Hell, it IS sexy. Then people get an IM-ME, a...
Original Post Author: Tom Liston [Twitter: @tliston] Original Date Published: 11 June 2013 Doing a Google search for “arduino GPS clock” turns up more than a few other projects that use the time information found within the NMEA data provided by a GPS...