This is the kind of stuff I love. Recently I was given a GPS tracker from an individual. This tracker had been embedded in a victim’s car for 6 years. The following video examines the tracker’s components and method of install. Below the video you’ll find some close-up photos of the device. GPS Tracker Photos […]
Auto Answer is a feature in many VoIP phones that allows the phone to go off-hook the very instant a call is received by the instrument. In this video we’ll look at how this feature is setup and talk about the security vulnerabilities. NIST Report: Link Video Conferencing Auto Answer: Link 1 Link 2 Link 3
Sometime when performing a packet capture, you may come across some VoIP conversations. If the initial call setup is not in this capture, subsequent voice packets will be labeled in such a way that it makes it difficult to decode the VoIP conversation. What follows is a tutorial to get around this problem.
Every time I take someone sight seeing in DC, I can’t un-see them. I should be alright with CCTV cameras hanging off of structures. I’m a security professional. We eat vulnerabilities for breakfast and birth countermeasures at dinner. This, however is different. Let me demonstrate my frustration. First, take the lovely Abraham Lincoln Memorial. Be […]
Microsoft Hacked, Hackers Rejoice, Hackers Hacked Yesterday the Syrian Electronic Army (SEA) hacked several Microsoft Twitter accounts. The SEA is a contingent of hackers that are supportive of Syrian President Bashar al-Assad. After immediately taking credit for the attack and bragging all over the internet, they are today nursing a small wound of having their […]