❌

Reading view

Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ 

In the world of cybersecurity, it’s important to understand what attack surfaces exist. The best way to understand something is by first doing it. Whether you’re an aspiring penetration tester, […]

The post Wi-Fi Forge: Practice Wi-Fi Security Without HardwareΒ  appeared first on Black Hills Information Security, Inc..

  •  

Satellite Hacking

by Austin Kaiser // Intern Hacking a satellite is not a new thing. Satellites have been around since 1957. The first satellite launched was called Sputnik 1 and was launched […]

The post Satellite Hacking appeared first on Black Hills Information Security, Inc..

  •  

How to Install LineageOS on Your Android DeviceΒ 

Hey guys, my name is Connor. I am a web developer here at BHIS who also loves hacking phones. Particularly, Android phones!Β Today, I am going to show you the basics […]

The post How to Install LineageOS on Your Android DeviceΒ  appeared first on Black Hills Information Security, Inc..

  •  

Offensive IoT for Red Team Implants – Part 1

This is part one of a multipart blog series on researching a new generation of hardware implants and how using solutions from the world of IoT can unleash new capabilities. […]

The post Offensive IoT for Red Team Implants – Part 1 appeared first on Black Hills Information Security, Inc..

  •  

Introducing LoRa (Long Range) Wireless Technology – Part 1

Ray Felch // This write-up is the first of a multi-part series, providing an introduction to LoRa wireless technology and the LoRaWAN, low-power wide-area network (LPWAN). Interestingly, I came across […]

The post Introducing LoRa (Long Range) Wireless Technology – Part 1 appeared first on Black Hills Information Security, Inc..

  •  

Understanding Zigbee and Wireless Mesh Networking

Ray Felch // Preface: Recently, I acquired a few home automation devices, so that I might research Zigbee and get a better understanding of how this very popular wireless technology […]

The post Understanding Zigbee and Wireless Mesh Networking appeared first on Black Hills Information Security, Inc..

  •  

Using SDR to Build a Trunk Tracker – Police, Fire, and EMS Scanner

Ray Felch // IntroductionΒ  Recently, I came across an interesting article on using software-defined radio (SDR) to create aΒ Police, Fire,Β EMS,Β and Public Safety systems scanner. Viewing a few of these Trunk […]

The post Using SDR to Build a Trunk Tracker – Police, Fire, and EMS Scanner appeared first on Black Hills Information Security, Inc..

  •  

Information From Thin Air: Using SDR to Extract DTMF from Radio Waves

Ray Felch // DisclaimerΒ  When using an FM transmitter, do notΒ modifyΒ the intended operation of the module by amplifying the transmitted signal. Also, be sure that attaching an FM high gain […]

The post Information From Thin Air: Using SDR to Extract DTMF from Radio Waves appeared first on Black Hills Information Security, Inc..

  •  

RFID Proximity Cloning Attacks

Ray Felch // Introduction While packing up my KeyWe Smart Lock accessories, and after wrapping up my research and two previous blogs β€œReverse Engineering a Smart Lock” and β€œMachine-in-the-Middle BLE […]

The post RFID Proximity Cloning Attacks appeared first on Black Hills Information Security, Inc..

  •  

Machine-in-the-Middle (MitM) BLE Attack

Ray Felch // Introduction Continuing with my ongoing Smart Lock attack research (see blog Reverse Engineering a Smart Lock), I decided to move my focus to a different type of […]

The post Machine-in-the-Middle (MitM) BLE Attack appeared first on Black Hills Information Security, Inc..

  •  

Reverse Engineering a Smart Lock

Ray Felch // INTRODUCTION Recently I was afforded the opportunity to research the findings of a well-known security firm (F-Secure), who had discovered a vulnerability in the Guardtec KeyWe Smart […]

The post Reverse Engineering a Smart Lock appeared first on Black Hills Information Security, Inc..

  •  

Promiscuous Wireless Packet Sniffer Project

Ray Felch // Introduction: After completing and documenting my recent research into keystroke injections (Executing Keyboard Injection Attacks), I was very much interested in learning the in-depth technical aspects of […]

The post Promiscuous Wireless Packet Sniffer Project appeared first on Black Hills Information Security, Inc..

  •  

Executing Keyboard Injection Attacks

Ray Felch // Preface: Following the work of the Bastille Research Group (See: https://github.com/BastilleResearch/mousejack), I was interested in knowing if these (keyboard injection) vulnerabilities were still valid. To my surprise, […]

The post Executing Keyboard Injection Attacks appeared first on Black Hills Information Security, Inc..

  •  

How To Replay RF Signals Using SDR

Ray Felch // SOFTWARE DEFINED RADIO: RF Signal Replay Techniques Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any […]

The post How To Replay RF Signals Using SDR appeared first on Black Hills Information Security, Inc..

  •  

GNU Radio Primer

Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting any data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. […]

The post GNU Radio Primer appeared first on Black Hills Information Security, Inc..

  •  

GSM Traffic and Encryption: A5/1 Stream Cipher

Ray FelchΒ // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, […]

The post GSM Traffic and Encryption: A5/1 Stream Cipher appeared first on Black Hills Information Security, Inc..

  •  
❌