Practical Physical Exploitation Course Review

"The Practical Physical Exploitation course is well worth the time, money, and effort. The instructors have built an excellent offering that is a true 'zero to hero' style course that not only new pentesters, but seasoned professionals would both gain value from attending."…

The Covert Hardware Implant: Part 2

In Part 1 of this series, we took you through the hardware build. Now we work through making it operational for your next Red Team engagement.…

The Covert Hardware Implant: Part 1

Get your Dremel ready and hone your soldering skills. The STACKTITAN team is demonstrating the process to take a readily available surge protector and repurpose it into a covert hardware implant suitable for most any Red Team operation.…

Hardware-Hacking: Arduino R4 and a Microwire EEPROM

Let's explore how we might interface with a Microwire EEPROM and extract data using the newly released Arduino UNO R4 eval board.…

SE: Build a Caller ID Spoofing Rig

Telephone Caller ID (CID) is often abused to manipulate the recipient's trust. Come explore the technology as STACKTITAN's Alex Sander's demonstrates building a CID spoofing rig.…