A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Exploit Development with Ruby – An Intro Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos)

The Glitch: Hardware With Hacking Made Easy
Derbycon 2012

There are many great “Do It Yourself” security testing hardware projects out there. The problem for most people is the time and expertise it takes to construct and operate them. I will be introducing The Glitch as a simple to use, plug-and-play, open source, security testing hardware platform. With this project there is no need to solder or write code, unless that’s your thing. To make things easy, all user configuration is done on a Micro SD card. Users can select from multiple pre-configured modules using a small DIP switch. Have it set to target a Windows system, flip a switch, and instead run your OSX attack module. That’s great and all, but what does it do? I will be demonstrating a few projects currently available for The Glitch. You will see how to use keystroke injection to do things like set up a reverse SSH connection off a live cd, record keystrokes and replay them with the keylogger setup, embed the hardware into USB attached devices, and expand The Glitch to work with technologies like Bluetooth, RFID/NFC, and more.

JP Dunning “.ronin”

JP “.ronin” is a security researcher and consultant. His research interests focus primarily on wireless and portable security. He is the primary developer on Katana USB drive and various other open source projects. He maintains www.hackfromacave.com for publishing projects and research.
 

Back to Derbycon 2012 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast