This section delves into the world of hardware security, examining physical and embedded systems vulnerabilities, and how they can be exploited to compromise devices, and bypass security mechanisms. From wireless signal interception and GPS spoofing to manipulating embedded devices via serial and GPIO interfaces, the articles cover a wide range of penetration testing techniques used to assess and secure hardware environments.
- Physical Intrusion DetectionConfiguring sensors to detect physical intrusion.
- EvilCrowRF V2Using the EvilCrowRF to transmit Sub-Ghz signals.
- GPIOInteracting with GPIO’s using Python.
- Bluetooth Low EnergyCompleting BLE CTF.
- Serial Peripheral InterfacesInteracting with SPI to extract the contents of a ROM.
- TEMPEST SDRIntercepting signals from a HDMI monitor.
- UART ConnectionsInterfacing with UART to gain command line access on a embedded device.
- GPS Signal SpoofingFalsifying Global Positioning System signals.
- Modbus SecurityPentesting the Modbus protocol.
- Configuring an ESP32 in Ubuntu 22.04Getting an ESP32 to work with Ubuntu and Visual Studio Code.
- Getting Started with Bash BunnyStealing credentials using Quick Creds.
- Windows Domain Authentication With YubiKeyConfiguring YubiKey two factor authenticaton for interactive login to a Windows domain.