Syndicated Blog

Limp Bizkit - Rollin' (Air Raid Vehicle)

My WHCD exam experience

| | whcd blue-team exam hands-on
IntroductionMy story starts in July in Budapest, summer is hot. Way too hot. I am working in the cozy air-conditioned office room and look at my daily schedule. I have a business ...
The RastaLabs experience

The RastaLabs experience

IntroductionIt was 20 November, and I was just starting to wonder what I would do during the next month. I had already left my previous job, and the new one would only ...
Hacktivity 2018 badge - quick start guide for beginners

Hacktivity 2018 badge – quick start guide for beginners

| | badge, Hacking, hacktivity, HW hacking
You either landed on this blog post because you are a huge fan of Hacktivityyou bought this badge around a year agoyou are just interested in hacker conference badge hacking. or maybe ...
How to build a "burner device" for DEF CON in one easy step

How to build a "burner device" for DEF CON in one easy step

| | build, burner laptop, burner phone, defcon, HowTo
TL;DR: Don't build a burner device. Probably this is not the risk you are looking for.IntroductionEvery year before DEF CON people starts to give advice to attendees to bring "burner devices" to DEF ...
Recovering data from an old encrypted Time Machine backup

Recovering data from an old encrypted Time Machine backup

| | forensics, macos, NAS, time capsule, time machine
Recovering data from a backup should be an easy thing to do. At least this is what you expect. Yesterday I had a problem which should have been easy to solve, but ...

Why (I believe) WADA was not hacked by the Russians

| | attribution, Hack, Russia, WADA
Disclaimer: This is my personal opinion. I am not an expert in attribution. But as it turns out, not many people in the world are good at attribution. I know this post ...
One reason why InfoSec sucked in the past 20 years - the "security tips" myth

One reason why InfoSec sucked in the past 20 years – the "security tips" myth

| | myth, security tips
From time to time, I get disappointed how much effort and money is put into securing computers, networks, mobile phones, ... and yet in 2016 here we are, where not much has ...

How I hacked my IP camera, and found this backdoor account

| | camera, command injection, Hack, iot, ipcamera, junk hacking
The time has come. I bought my second IoT device - in the form of a cheap IP camera. As it was the most affordable among all others, my expectations regarding security ...
#HITB2012KUL D1T2 - Marc 'Van Hauser' Heuse - IPv6 Insecurity Revolutions

How to secure your home against "Internet of Things" and FUD

| | Hack, home security, Internet of things, iot
TL;DR, most of the security news about IoT is full of FUD. Always put the risks in context - who can exploit this and what can the attacker do with it. Most ...
Mythbusters: Is an open (unencrypted) WiFi more dangerous than a WPA2-PSK? Actually, it is not.

Mythbusters: Is an open (unencrypted) WiFi more dangerous than a WPA2-PSK? Actually, it is not.

| | VPN, wifi, wireless, WPA2, wpa2-psk
IntroductionWhenever security professionals recommend the 5 most important IT security practices to average users, one of the items is usually something like: “Avoid using open Wifi” or “Always use VPN while using ...