The Covert Hardware Implant: Part 2

In Part 1 of this series, we took you through the hardware build. Now we work through making it operational for your next Red Team engagement.…

The Covert Hardware Implant: Part 1

Get your Dremel ready and hone your soldering skills. The STACKTITAN team is demonstrating the process to take a readily available surge protector and repurpose it into a covert hardware implant suitable for most any Red Team operation.…

Hardware-Hacking: Arduino R4 and a Microwire EEPROM

Let's explore how we might interface with a Microwire EEPROM and extract data using the newly released Arduino UNO R4 eval board.…

SE: Build a Caller ID Spoofing Rig

Telephone Caller ID (CID) is often abused to manipulate the recipient's trust. Come explore the technology as STACKTITAN's Alex Sander's demonstrates building a CID spoofing rig.…

Hardware-Hacking: Lifting Firmware

Join us as we explore a technique to lift firmware from hardware. This is the first of many hardware hacking topics that the STACKTITAN team will be sharing and hope that it inspires you to crack open and investigate that perfectly functional router on your desk.…