Identifying Malware by Sniffing its EM Signature

The phrase “extraordinary claims require extraordinary evidence” is most often attributed to Carl Sagan, specifically from his television series Cosmos. Sagan was probably not the first person to put forward …read more Continue reading Identifying Malware by Sniffing its EM Signature

HackRF One – Replay Attack on Garage Door does not work (12 DIP switches) [migrated]

My colleagues and I have taken on a HackRF project for university, using HackRF One. One of the targets is garage door controllers.
We own two controllers with DIP switches for the same door, one has 10 switches while the other one has 12…. Continue reading HackRF One – Replay Attack on Garage Door does not work (12 DIP switches) [migrated]

Exposing Computer Monitor Side-Channel Vulnerabilities with TempestSDR

Having been endlessly regaled with tales of side-channel attacks and remote exploits, most of us by now realize that almost every piece of gear leaks data like a sieve. Everything from routers to TVs to the power supplies and cooling fans of computers can be made to give up their …read more

Continue reading Exposing Computer Monitor Side-Channel Vulnerabilities with TempestSDR

Which devices store audio in the cloud without end-to-end encryption? [on hold]

Background
Many consumers are concerned by the fact that virtual assistants, such as Amazon Alexa, Siri, and Google Assistant, store recorded speech in the platform provider’s cloud, where the data is analyzed and could be ex… Continue reading Which devices store audio in the cloud without end-to-end encryption? [on hold]

How to identify the communication protocol used in a wireless device?

I really hope that this is the right place to ask.

I need to analyze a baby monitor for any security or privacy weaknesses.

The spec sheet of the baby monitor says, that it uses the ISM 2400~2483.5 MHz bands to transfer vid… Continue reading How to identify the communication protocol used in a wireless device?

Monitor with two simultaneous, seperate inputs: can an OS read from both inputs? [on hold]

For example, if you have two computers connected to one monitor, at the same time: can the visuals being sent from computer #1 to the monitor be received by computer #2 ? In any kind of simple way ?

I am aware there are more… Continue reading Monitor with two simultaneous, seperate inputs: can an OS read from both inputs? [on hold]

What buses carrying sensitive information on a running computer are vulnerable to sniffing?

Has there been any research on what buses in a computer can be analyzed while they are live, without rebooting the system to insert a proxy device? For example, I imagine I2C would be very easy to sniff because the wires are exposed, and b… Continue reading What buses carrying sensitive information on a running computer are vulnerable to sniffing?