You might like
#HITBCyberWeek #CommSec D1 - Adventures in Building a CAN Bus Sniffer - Andrey Voloshin, Sasha Olenyev & Illia Tolokonnikov - youtube.com/watch?v=ku2_t9… cc @techmakerua
youtube.com
YouTube
#HITBCyberWeek #CommSec D1 - Adventures in Building a CAN Bus Sniffer
😈 pssst. Our CAN Bus Sniffers now have a landing page. We don't expect a huge amount of orders, so we decided to try selling them without big platforms. Is it a wise decision? 🤔 Presented at @hackinthebox #HITBCyberWeek #carhacking #canbus techmaker.ua/canbus-sniffers
No, not only CANbus sniffers. We have much more to say about secure hardware development. Register for a free workshop 👇 @hackinthebox #HITBCyberWeek cyberweek.ae/2020/ci-cd-wit…
You'll see this creature at the HITB CyberWeek 😉 "Adventures in Building a CAN Bus Sniffer" 😊 #hitbcyberweek cyberweek.ae/2020/commsec-t…
Who wants this Thumbelina-size CANbus sniffer? USB type-c, two CANbuses at the same time, onboard terminators, SocketCAN compatible.
#badgelife - when your badge helps you breathe clean air. This is what we know about NoNameBadge 2020 👇 blog.techmaker.ua/en/posts/nonam…
As usual in my slides (in relation to my talk about car hacking in Bugcrowd's LevelUP 0x06), here are the people I want to give some shout outs or credits especially to @CarHackVillage, @mintynet, @OpenGarages , @mintynet and others :)
Can't wait to bring our very own and re-engineered canbus sniffers 😈 TechMaker comes to town, @Bugcrowd #bugbash #carhacking
MPU9250 + ESP32 = ❤️😁😜
This is how you make an oracle from a #NoNameBadge. Add accelerometer, modify the firmware, ask a question, shake your badge. Green is yes, red is no, yellow is shake again!
You can't rely on eXecute-Only Memory (XOM) to protect your IP arxiv.org/abs/1909.05771
1. Determine which peripherals are used 2. Create own test project for the MCU 3. Compile the project and disassembly the obtained ELF file 4. Generate signatures for functions and data types 5. Use obtained signatures for the stripped binary analysis medium.com/techmaker/enri…
STM32 Shellcode: firmware dump over UART. Simple "crackme" with just-for-fun PoC exploit to dump the firmware. medium.com/techmaker/stm3…
United States Trends
- 1. Veterans Day 39.5K posts
- 2. Good Tuesday 23.3K posts
- 3. SoftBank 5,597 posts
- 4. Packers 102K posts
- 5. Eagles 129K posts
- 6. United States Armed Forces N/A
- 7. Islamabad 29.2K posts
- 8. Bond 59.7K posts
- 9. Benítez 14.3K posts
- 10. Allora 31.2K posts
- 11. Jordan Love 15.8K posts
- 12. JOONGDUNK BRIGHT SKIN 294K posts
- 13. UC Berkeley 61.9K posts
- 14. Green Bay 19.2K posts
- 15. Tsushima 2,464 posts
- 16. LaFleur 15.4K posts
- 17. 600,000 Chinese 8,333 posts
- 18. AJ Brown 7,432 posts
- 19. Hemp 29.2K posts
- 20. McManus 4,616 posts
Something went wrong.
Something went wrong.