❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ 

By: BHIS
27 February 2025 at 10:00

In the world of cybersecurity, it’s important to understand what attack surfaces exist. The best way to understand something is by first doing it. Whether you’re an aspiring penetration tester, […]

The post Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ  appeared first on Black Hills Information Security, Inc..

Satellite Hacking

By: BHIS
3 October 2024 at 11:00

by Austin Kaiser // Intern Hacking a satellite is not a new thing. Satellites have been around since 1957. The first satellite launched was called Sputnik 1 and was launched […]

The post Satellite Hacking appeared first on Black Hills Information Security, Inc..

Offensive IoT for Red Team Implants – Part 1

By: BHIS
9 May 2024 at 11:00

This is part one of a multipart blog series on researching a new generation of hardware implants and how using solutions from the world of IoT can unleash new capabilities. […]

The post Offensive IoT for Red Team Implants – Part 1 appeared first on Black Hills Information Security, Inc..

Introducing LoRa (Long Range) Wireless Technology – Part 1

Ray Felch // This write-up is the first of a multi-part series, providing an introduction to LoRa wireless technology and the LoRaWAN, low-power wide-area network (LPWAN). Interestingly, I came across […]

The post Introducing LoRa (Long Range) Wireless Technology – Part 1 appeared first on Black Hills Information Security, Inc..

Understanding Zigbee and Wireless Mesh Networking

By: BHIS
27 August 2021 at 13:34

Ray Felch // Preface: Recently, I acquired a few home automation devices, so that I might research Zigbee and get a better understanding of how this very popular wireless technology […]

The post Understanding Zigbee and Wireless Mesh Networking appeared first on Black Hills Information Security, Inc..

Using SDR to Build a Trunk Tracker – Police, Fire, and EMS Scanner

By: BHIS
17 May 2021 at 13:46

Ray Felch // IntroductionΒ  Recently, I came across an interesting article on using software-defined radio (SDR) to create aΒ Police, Fire,Β EMS,Β and Public Safety systems scanner. Viewing a few of these Trunk […]

The post Using SDR to Build a Trunk Tracker – Police, Fire, and EMS Scanner appeared first on Black Hills Information Security, Inc..

Information From Thin Air: Using SDR to Extract DTMF from Radio Waves

By: BHIS
4 May 2021 at 08:54

Ray Felch // DisclaimerΒ  When using an FM transmitter, do notΒ modifyΒ the intended operation of the module by amplifying the transmitted signal. Also, be sure that attaching an FM high gain […]

The post Information From Thin Air: Using SDR to Extract DTMF from Radio Waves appeared first on Black Hills Information Security, Inc..

Using Infrared for Hardware Control

By: BHIS
2 April 2021 at 12:58

Ray Felch // OverviewΒ  Infrared technology has been around for a very long time and is a wireless technology used in devices that convey data by way of Infrared radiation. […]

The post Using Infrared for Hardware Control appeared first on Black Hills Information Security, Inc..

RFID Proximity Cloning Attacks

By: BHIS
17 December 2020 at 08:10

Ray Felch // Introduction While packing up my KeyWe Smart Lock accessories, and after wrapping up my research and two previous blogs β€œReverse Engineering a Smart Lock” and β€œMachine-in-the-Middle BLE […]

The post RFID Proximity Cloning Attacks appeared first on Black Hills Information Security, Inc..

Machine-in-the-Middle (MitM) BLE Attack

By: BHIS
28 October 2020 at 11:19

Ray Felch // Introduction Continuing with my ongoing Smart Lock attack research (see blog Reverse Engineering a Smart Lock), I decided to move my focus to a different type of […]

The post Machine-in-the-Middle (MitM) BLE Attack appeared first on Black Hills Information Security, Inc..

Reverse Engineering a Smart Lock

By: BHIS
27 August 2020 at 08:15

Ray Felch // INTRODUCTION Recently I was afforded the opportunity to research the findings of a well-known security firm (F-Secure), who had discovered a vulnerability in the Guardtec KeyWe Smart […]

The post Reverse Engineering a Smart Lock appeared first on Black Hills Information Security, Inc..

Promiscuous Wireless Packet Sniffer Project

By: BHIS
27 May 2020 at 08:15

Ray Felch // Introduction: After completing and documenting my recent research into keystroke injections (Executing Keyboard Injection Attacks), I was very much interested in learning the in-depth technical aspects of […]

The post Promiscuous Wireless Packet Sniffer Project appeared first on Black Hills Information Security, Inc..

Executing Keyboard Injection Attacks

By: BHIS
4 March 2020 at 08:11

Ray Felch // Preface: Following the work of the Bastille Research Group (See: https://github.com/BastilleResearch/mousejack), I was interested in knowing if these (keyboard injection) vulnerabilities were still valid. To my surprise, […]

The post Executing Keyboard Injection Attacks appeared first on Black Hills Information Security, Inc..

Dumping Firmware With the CH341a Programmer

By: BHIS
29 January 2020 at 08:10

Rick Wisser // Note: This blog will also be a lab for any of the upcoming Wild West Hackin’ Fest Conferences. During a recent engagement, I came across an issue. […]

The post Dumping Firmware With the CH341a Programmer appeared first on Black Hills Information Security, Inc..

How To Replay RF Signals Using SDR

By: BHIS
23 January 2020 at 12:23

Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any […]

The post How To Replay RF Signals Using SDR appeared first on Black Hills Information Security, Inc..

GNU Radio Primer

By: BHIS
9 December 2019 at 10:40

Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. […]

The post GNU Radio Primer appeared first on Black Hills Information Security, Inc..

GSM Traffic and Encryption: A5/1 Stream Cipher

By: BHIS
11 November 2019 at 10:00

Ray FelchΒ // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, […]

The post GSM Traffic and Encryption: A5/1 Stream Cipher appeared first on Black Hills Information Security, Inc..

❌
❌