❌

Reading view

There are new articles available, click to refresh the page.

Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ 

In the world of cybersecurity, it’s important to understand what attack surfaces exist. The best way to understand something is by first doing it. Whether you’re an aspiring penetration tester, […]

The post Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ  appeared first on Black Hills Information Security, Inc..

Satellite Hacking

by Austin Kaiser // Intern Hacking a satellite is not a new thing. Satellites have been around since 1957. The first satellite launched was called Sputnik 1 and was launched […]

The post Satellite Hacking appeared first on Black Hills Information Security, Inc..

How to Install LineageOS on Your Android DeviceΒ 

Hey guys, my name is Connor. I am a web developer here at BHIS who also loves hacking phones. Particularly, Android phones!Β Today, I am going to show you the basics […]

The post How to Install LineageOS on Your Android DeviceΒ  appeared first on Black Hills Information Security, Inc..

Introducing LoRa (Long Range) Wireless Technology – Part 1

Ray Felch // This write-up is the first of a multi-part series, providing an introduction to LoRa wireless technology and the LoRaWAN, low-power wide-area network (LPWAN). Interestingly, I came across […]

The post Introducing LoRa (Long Range) Wireless Technology – Part 1 appeared first on Black Hills Information Security, Inc..

Using SDR to Build a Trunk Tracker – Police, Fire, and EMS Scanner

Ray Felch // IntroductionΒ  Recently, I came across an interesting article on using software-defined radio (SDR) to create aΒ Police, Fire,Β EMS,Β and Public Safety systems scanner. Viewing a few of these Trunk […]

The post Using SDR to Build a Trunk Tracker – Police, Fire, and EMS Scanner appeared first on Black Hills Information Security, Inc..

Information From Thin Air: Using SDR to Extract DTMF from Radio Waves

Ray Felch // DisclaimerΒ  When using an FM transmitter, do notΒ modifyΒ the intended operation of the module by amplifying the transmitted signal. Also, be sure that attaching an FM high gain […]

The post Information From Thin Air: Using SDR to Extract DTMF from Radio Waves appeared first on Black Hills Information Security, Inc..

Machine-in-the-Middle (MitM) BLE Attack

Ray Felch // Introduction Continuing with my ongoing Smart Lock attack research (see blog Reverse Engineering a Smart Lock), I decided to move my focus to a different type of […]

The post Machine-in-the-Middle (MitM) BLE Attack appeared first on Black Hills Information Security, Inc..

Promiscuous Wireless Packet Sniffer Project

Ray Felch // Introduction: After completing and documenting my recent research into keystroke injections (Executing Keyboard Injection Attacks), I was very much interested in learning the in-depth technical aspects of […]

The post Promiscuous Wireless Packet Sniffer Project appeared first on Black Hills Information Security, Inc..

Executing Keyboard Injection Attacks

Ray Felch // Preface: Following the work of the Bastille Research Group (See: https://github.com/BastilleResearch/mousejack), I was interested in knowing if these (keyboard injection) vulnerabilities were still valid. To my surprise, […]

The post Executing Keyboard Injection Attacks appeared first on Black Hills Information Security, Inc..

How To Replay RF Signals Using SDR

Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any […]

The post How To Replay RF Signals Using SDR appeared first on Black Hills Information Security, Inc..

GSM Traffic and Encryption: A5/1 Stream Cipher

Ray FelchΒ // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, […]

The post GSM Traffic and Encryption: A5/1 Stream Cipher appeared first on Black Hills Information Security, Inc..

❌