The Covert Hardware Implant: Part 2
In Part 1 of this series, we took you through the hardware build. Now we work through making it operational for your next Red Team engagement.…
In Part 1 of this series, we took you through the hardware build. Now we work through making it operational for your next Red Team engagement.…
Get your Dremel ready and hone your soldering skills. The STACKTITAN team is demonstrating the process to take a readily available surge protector and repurpose it into a covert hardware implant suitable for most any Red Team operation.…
Let's explore how we might interface with a Microwire EEPROM and extract data using the newly released Arduino UNO R4 eval board.…
Telephone Caller ID (CID) is often abused to manipulate the recipient's trust. Come explore the technology as STACKTITAN's Alex Sander's demonstrates building a CID spoofing rig.…
Join us as we explore a technique to lift firmware from hardware. This is the first of many hardware hacking topics that the STACKTITAN team will be sharing and hope that it inspires you to crack open and investigate that perfectly functional router on your desk.…