Here a first look at the Xiaomi WiFi+ PCB and Software is given.
Read more ›
The Mirai source code reveals the passwords, which are used to create the botnet.
These passwords should never ever be used to secure a device.
Read more ›
In my part time I have done my first Offensive Security course and certificate. It is called Wireless Attacks (WiFu) and deals with all kind of wireless attacks.
With this simple Python script it is possible to view a binary file in different styles. This is also possible for example with the Linux tool hexdump. Nevertheless it is sometimes necessary to have this code in an own tool.
$./binaryview.py | less ADDRESS | BIN | HEX | ASCII -----------+-------------------------------------+-------------+--------- 0x00000000 | 00000001 00000000 00000000 00000000 | 01 00 00 00 | . . . . 0x00000004 | 01010100 01010000 00101101 01001100 | 54 50 2d 4c | T P - L 0x00000008 | 01001001 01001110 01001011 00100000 | 49 4e 4b 20 | I N K . 0x0000000c | 01010100 01100101 01100011 01101000 | 54 65 63 68 | T e c h
The aim is to display content on the Waveshare touchscreen on the Raspberry Pi. For this the Python module Flask is used. With this it is possible to generate a webside with dynamic Python content and much more.
Start into full-screen iceweasel
The aim of this tutorial is to start iceweasel in full-screen automatically on boot up of the Raspberry Pi.
Connect a 7″ HDMI touch display to a Raspberry Pi:
Here a short set-up tutorial about the waveshare 7″ touchscreen for the Raspberry Pi is described.
This password crack should be hacked by timing analysis. A timing analysis is the time variation a program needs to check the password.
This password crack should be hacked by buffer overflow.
This password uses a simple check-sum comparison for authorization.
With a disassembler it is possible to analyze binary files. There are a lot of different programs on the market for different platforms. A lot of them supports different architectures too. Some of them are listed bellow.
This should be a very simple introduction about reverse engineering. The aim of this lab is to get access by getting the password out of the provided binary file. The source code in the solution is totally unusable for any kind of protection and is only for demonstration purpose.
The Gnublin board is a small form factor PCB with an embedded Linux on it. It can be bought on embedded-projects.net.
Picture of the Gnublin board:
LED cubes are a very popular project , while the sizes go from 3x3x3 to 10x10x10 on with RGB LEDs. At the university we have build a monochrome 5x5x5 LED cube.