mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#hardwarehacking

2 Beiträge2 Beteiligte0 Beiträge heute

There's a pretty nice ongoing #hardwarehacking project called the Evertop

"an ultra lower power, ultra long battery solar PC"

github.com/ericjenott/Evertop

Runs off an ESP32 with an e-Ink display and has a solar panel on the back.

"Evertop is a portable PC that emulates an IBM XT with an 80186 processor and 1MB RAM. It can run DOS, Minix, and some other old 1980s operating systems."

"Runs almost all IBM PC/XT compatible DOS software from the 1980s and early 90s."

Two days until #BSidesBoulder25 and only 15 tickets remain! Today we highlight, two #BSidesBoulder25 talks: Andrew Brandt's "Smashing Smishing by Quashing Quishing" and Eric Harashevsky's "Firmware Readout Bypass in STM92 (Don't put this in an alarm control panel).

Andrew's talk will examine QR-based phishing attacks, how attackers are exploiting QR codes and SMS to steal credentials and MFA tokens, and how a cross-industry collaboration between mobile vendors, telcos, and the infosec community could finally slam the door on mobile phishing. Think SafeBrowsing, but for QR scans! And we promise that our BSidesBoulder event QR codes will not redirect you to an Andrew-controlled C2 server.

Eric's talk will explore his adventure tinkering with an old STM92's firmware - the talk will explore his findings, reverse engineering the legacy microcontroller, bypassing firmware protections, and what that means for devices still hanging on your wall! Expect a live demo that is sure to excite your future hardware hacking journey.

#BSides #BSidesBoulder #CyberSecurity #Quishing #Smishing #MobileSecurity #PhishingDefense #HardwareHacking #FirmwareSecurity

Check out our full schedule at bsidesboulder.org/schedule/

Tickets are available for purchase for our 13 June event here: eventbrite.com/e/bsides-boulde

Hey #infosec #hardware #hardwarehacking peeps. I have an ARM bootrom, that I would like to run against a candidate firmware, and see what it is doing. Any ideas?
I obviously need to NOP out any instructions that reference hardware that won't be present in an emulator, load my candidate firmware to the appropriate address, and then jump to the validation routines. Anyone done something like this before?

I don't like UBI.

1st try at replacing the UBI partition on a NAND with my own patched version:

`ubi0 error: ubi_read_volume_table: bad attaching information, error 1`

Well ok, I can see that. 2nd try:

`ubi0 error: vtbl_check: too large reserved_pebs 405, good PEBs 392`

Huh well if you say so. Let's make sure the third try is attached on Linux before I do yet another chip off reprogramming on the device then ...

3rd try:

`ubi0 error: ubi_eba_init: no enough physical eraseblocks (0, need 1)`

well fsck you. really.

(There are only so many times the PCB will take a full chip off cycle and I did not get in-circuit to work ... )

Got a new IoT device to probe. Notice the hw is completely sealed with no visible way in. Searching for anyone who's done a public teardown.

Nothing.

Finally resort to cutting the case open with a dremel. After lots of work sees how it can be opened non-destructively.

Can't document it publicly as to not give away working on it :P

Life of a hw/fw security researcher.

Le planning des streams de la semaine est là ! 🥳

Après plusieurs semaines off et une semaine de pseudo-reprise, il est l'heure de reprendre une activité normale sur Twitch afin de bosser les sujets plus qu'urgents 😱 ...

Au menu cette semaine: la conception de l'atelier pour leHACK Kids ! Je dois terminer au plus vite l'interface web permettant de piloter notre name tag LED afin d'avancer sur le support et la logistique ☺️.

Fortgeführter Thread

🎮 Hack NFC. Emulate transit. Play arcade.

We're building a userland Linux implementation of Android’s NFC-F (FeliCa) Host Card Emulation—so your Linux device can act like a real Japanese contactless card!

That means:
- Emulate Suica/PASMO-style transit cards
🛤️
- Log into arcade games:
-
SEGA Performai (maimai, CHUNITHM, O.N.G.E.K.I) via Aime
-
Konami e-Amusement (beatmania IIDX, GuitarFreaks, DrumMania, DDR, Sound Voltex, DanceRush Stardom)
-
Bandai Namco BaNaPassport titles (Taiko no Tatsujin, Wangan Midnight Maximum Tune)
-
SEGA's Initial D Arcade Stage series

We're looking for reverse engineers, Linux hackers, and Arcade fans to help bring Secure NFC emulation to Linux. Let’s make your laptop or Linux phone your next arcade pass!

#nfc #nfcf #felica #linux #hardwarehacking #opensource #arcade #reverseengineering #performai #aime #eamusement #banapass

Looking for aspiring Linux hardware and software hackers to work on NFC-F/FeliCa (Secure NFC) support in Linux! We're interested!

Imagine Linux emulating transit cards— also logging into SEGA (Aime), Namco (BaNaPassPort), Konami (e-Amusement) arcade games!

Join us
@hq and let's turn Linux phones into transit (or arcade) cards! Let's ride the train, on Linux! #nfc #nfcf #felica #linux #hardwarehacking