DEF CON 28 Safe Mode – Feng Xiao’s ‘Discovering Hidden Properties To Attack Node js Ecosystem’

Many thanks to DEFCON for publishing their comprehensive and outstanding presentations via the organization’s DEFCON 28 SAFE MODE Conference Schedule Page and their YouTube chennel. Enjoy!
Permalink
The post DEF CON 28 Safe Mode – Feng Xiao&#821… Continue reading DEF CON 28 Safe Mode – Feng Xiao’s ‘Discovering Hidden Properties To Attack Node js Ecosystem’

Researcher retrieves $300,000 worth of Bitcoin from an encrypted Zip file

By Waqas
An investor had locked $300k worth of Bitcoin in an encrypted Zip file and forgot its password.
This is a post from HackRead.com Read the original post: Researcher retrieves $300,000 worth of Bitcoin from an encrypted Zip file
Continue reading Researcher retrieves $300,000 worth of Bitcoin from an encrypted Zip file

Great Badge Concept: A “Geiger Counter” for WiFi Deauthentication Frames

[Nick Price] had a wonderful concept for a DEFCON badge: a device that worked a lot like a directional Geiger counter, but chirped at detecting WiFi deauthentication packets instead of radiation. That’s a wild idea and it somehow slipped past us last year. Why detect such a thing? Well, the …read more

Continue reading Great Badge Concept: A “Geiger Counter” for WiFi Deauthentication Frames

Launch of the SEVIllage at Def Con 28!

We’re announcing the launch of the SEVillage at Def Con 28! Find out how you can sign up for all of our exciting competitions and more!
The post Launch of the SEVIllage at Def Con 28! appeared first on Security Through Education.
The post Launch of the… Continue reading Launch of the SEVIllage at Def Con 28!

Developing Retro Games For Conference Badges With Kate Morris

PCB badges have exploded in popularity in recent years. Starting out as a fun token of entry to a conference, they’re now being developed by all manner of independent groups, with DEFCON serving as the heart of the #badgelife movement. After DEFCON 26, Kate Morris and associates decided to undertake …read more

Continue reading Developing Retro Games For Conference Badges With Kate Morris

Reverse-Engineering Xiaomi IoT Firmware

IoT devices rarely ever just do what they’re advertised. They’ll almost always take up more space than they need to – on top of that, their processor and memory alone should be enough to run a multitude of other tasks while not necessarily compromising the task they were built to …read more

Continue reading Reverse-Engineering Xiaomi IoT Firmware

Customizing Xiaomi ARM Cortex-M Firmware

This hack was revealed a while ago at DEFCON26, but it’s still a fascinating look into vulnerabilities that affect some of the most widely used IoT devices.

[Dennis Giese] figured out a way to modify ARM Cortex-M based firmware for use in customizing the functionality of devices or removing access …read more

Continue reading Customizing Xiaomi ARM Cortex-M Firmware

Hacking 2020 voting systems is a ‘piece of cake’

That’s how Senator Wyden described the results of DefCon’s Voting Village, where all of 100 voting systems were easily picked apart by hackers. Continue reading Hacking 2020 voting systems is a ‘piece of cake’