This section delves into the world of hardware security, examining physical and embedded systems vulnerabilities, and how they can be exploited to compromise devices, and bypass security mechanisms.
- Physical Intrusion DetectionConfiguring sensors to detect physical intrusion.
- EvilCrowRF V2Using the EvilCrowRF to transmit Sub-Ghz signals.
- GPIOInteracting with GPIO’s using Python.
- Bluetooth Low EnergyCompleting BLE CTF.
- Serial Peripheral InterfacesInteracting with SPI to extract the contents of a ROM.
- TEMPEST SDRIntercepting signals from a HDMI monitor.
- UART ConnectionsInterfacing with UART to gain command line access on a embedded device.
- GPS Signal SpoofingFalsifying Global Positioning System signals.
- Modbus SecurityPentesting the Modbus protocol.
- Configuring an ESP32 in Ubuntu 22.04Getting an ESP32 to work with Ubuntu and Visual Studio Code.
- Getting Started with Bash BunnyStealing credentials using Quick Creds.
- Windows Domain Authentication With YubiKeyConfiguring YubiKey two factor authenticaton for interactive login to a Windows domain.