Rooting the Amazon Fire TV Cube with an Arduino

Amazon might not be happy about it, but at least part of the success of their Fire TV Stick was due to the large hacking and modification scene that cropped up around the Android-powered device. A quick search on YouTube for “Fire Stick Hack” will bring up a seemingly endless array of videos, some with millions of views, which will show viewers how to install unofficial software on the little media dongle. Now it looks like their latest media device, the Fire TV Cube, is starting to attract the same kind of attention.

The team at [Exploitee.rs] has recently taken …read more

Continue reading Rooting the Amazon Fire TV Cube with an Arduino

Are most Linux systems that allow non-root users to execute code straightforwardly rootable?

long story short if you can execute code on a box it is usually straightforward to get root

(quote source)

The immediate implication of this quote (if it’s accurate) is that if you’re running a multi-user system and don’t try your da… Continue reading Are most Linux systems that allow non-root users to execute code straightforwardly rootable?

Hacker Pops Top On NFC Vending Machines

Vending machines used to be a pretty simple affair: you put some coins in, and food or drink that in all likelihood isn’t fit for human consumption comes out. But like everything else today, they are becoming increasingly complex Internet connected devices. Forget fishing around for pocket change; the Coke machine at the mall more often than not has a credit card terminal and a 30 inch touch screen display to better facilitate dispensing cans of chilled sugar water. Of course, increased complexity almost always goes hand in hand with increased vulnerability.

So when [Matteo Pisani] recently came across a …read more

Continue reading Hacker Pops Top On NFC Vending Machines

Container Security Part 3 – Kubernetes Cheat Sheet

During the first two articles of this series, we went from some initial research as a “Quick Dive into Containers, Kubernetes and Security” to a more detailed look at the first steps of actual implementation in “Container Security Par… Continue reading Container Security Part 3 – Kubernetes Cheat Sheet

Ease Me Into Cryptography Part 1: Buzzwords and Hash Function

You know what it’s like being in security, and someone asks you what you do. Now imagine the responses when I tell people I do cryptography. And it’s not just outsiders. Even within a techie crowd, common responses range from “Ooof, t… Continue reading Ease Me Into Cryptography Part 1: Buzzwords and Hash Function

Container Security Part 2 – Benchmarks to the Rescue

Containers are like BYOD (Bring Your Own Device). They are infiltrating our ranks, and InfoSec professionals’ gut reaction is to hesitate in including them in their environments. But instead of dismissing containers out of hand, I thought it woul… Continue reading Container Security Part 2 – Benchmarks to the Rescue