❌

Reading view

There are new articles available, click to refresh the page.

Gathering Proximity Card Credentials: The Wiegotcha

David Fletcher// There are a number of items that I watch on eBay. Included in that group are long-range proximity card readers. As it turns out, I was recently able […]

The post Gathering Proximity Card Credentials: The Wiegotcha appeared first on Black Hills Information Security, Inc..

How to: From WarDriving to SSIDs on Google Maps with Latitude/Longitude

Jordan Drysdale // Step 1: Build your capture rig RPi3, Kali,Β Battery Packs,Β 2 x supported wifi card of your choosing (I used theΒ Alfa BlackΒ for this run). My finished product: Solar Battery […]

The post How to: From WarDriving to SSIDs on Google Maps with Latitude/Longitude appeared first on Black Hills Information Security, Inc..

Turning a Raspberry Pi 3 Into a Cloaking Device With goSecure VPN

Jordan Drysdale // This article, like the IADGov link hereΒ has three major steps. First, acquire a Raspberry Pi and a VPS running CentOS 6.8. Second, configure the server and Raspberry […]

The post Turning a Raspberry Pi 3 Into a Cloaking Device With goSecure VPN appeared first on Black Hills Information Security, Inc..

❌