Somebody Is Securing Samsung Wireless Network Extenders

Somebody Is Securing Samsung Wireless Network Extenders

Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 03 June 2013 Black Hat USA 2013 will include a presentation by Tom Ritter and Doug DePerry titled: “I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a...

What Was The Name Of That Storm?

Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 25 April 2013 Mike Poor (@Mike_Poor) noticed Stephen Northcutt’s blog post about phone spear-phishing. This reminded him of an email that I sent to the Senior Security Analysts here...
Memory Acquisition from FBGA Components

Memory Acquisition from FBGA Components

Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 08 April 2013 Accessing memory from embedded devices can be accomplished multiple ways. The easiest methods include using debugging ports or tapping the exposed pins of a Thin...

Penetration Testing Considerations

Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 28 March 2013 John Sawyer pointed me to a blog post Getting the most out of your pentesting by Wendy Nather of 451 Security. I would like to provide a little bit more context in the hopes...
GRC Transmission Analysis: Getting To the Bytes

GRC Transmission Analysis: Getting To the Bytes

Post Author: Don C. Weber [Twitter: @cutaway] Date Published: 15 May 2014 I have not picked up my HackRF Jawbreaker in a while (Figure 0x0). Family and billable work trump side projects. Lucky for me Tom Liston and I started teaching the Assessing and Exploiting...

Welcome to InGuardians Labs Blog!

Original Post Author: Chris Sanders [Twitter: @chrissanders88] Original Date Published: 22 February 2013 All of us at InGuardians are really excited to welcome you to the first post on our InGuardians Labs blog. In addition to consulting, InGuardians prides itself on...