Hacksnmod
Showing posts with label
Security Hacks
.
Show all posts
Showing posts with label
Security Hacks
.
Show all posts
Clever Reed Switch Catches Thief
›
When [Abhimanyu Kumar] noticed money going missing from his small bookshop, he decided to set up a little trap to catch the thief. The pro...
Gesture Based Security Lock
›
A team of students from Cornell University are looking into alternative ways of creating a security system that can be locked or unlocked ...
Key Cutting with a CNC Mill
›
Keys cost like what, $2 to copy at a locksmith? But where’s the fun in that? Here’s an easy way to cut your own keys using a CNC mill! [Bol...
JTAGulator Finds Debug Interfaces
›
[Joe Grand] has come up with a tool which we think will be useful to anyone trying to hack a physical device: The JTAGulator . We touched on...
Reverse Engineering a D-Link Backdoor
›
Here’s one true hack ( Google cache link ) for our dear Hackaday readers. On a Saturday night, as [Craig] didn’t have anything else to do...
Cracking GSM with RTL-SDR for Thirty Dollars
›
Theoretically, GSM has been broken since 2003, but the limitations of hardware at the time meant cell phone calls and texts were secure fro...
Running Custom Code on Cheap One-time Password Tokens
›
One-time passwords (OTP) are often used in America but not so much in Europe. For our unfamiliar readers, OTP tokens like the one shown ab...
Getting a Shell on any Android Device
›
If you’re an Evil Customs Agent or other nefarious Three Letter Agency Person, you’re probably very interesting in getting data off people...
An Awesome Wireless Motion Sensor
›
Wireless sensor networks are nothing new to Hackaday, but [Felix]‘s wireless PIR sensor node is something else entirely. Rarely do we see s...
Sniffing Out LG Smart TV Tracking Protocol
›
[DoctorBeet] noticed the advertisements on the landing screen of his new LG smart television and started wondering about tracking. His cur...
Update: SD Card Locker Now Supports Password Protect
›
[Karl Lunt] has updated his Secure Digital Card locker to support password based locking . [Karl's] original design only supported wri...
Google Security Certificates Forged
›
Recently, Google discovered that a certificate authority (CA) issued forged certificates for Google domains . This compromises the trust pr...
Ambient Computer Noise Leaks Your Encryption Keys
›
[Daniel, Adi, and Eran], students researchers at Tel Aviv University and the Weizmann Institute of Science have successfully extracted 4096...
Chameleon Emulates Contactless Smart Cards
›
Researchers at Ruhr University of Bochum in Germany have been busy working with RFID and related devices for quite some time now. They call...
›
Home
View web version