While I was at Shmoocon 2010, I was given a Phantom Keystroker. It’s a neat little USB dongle which looks like a thumbdrive that you could surreptitiously install in the back of someone’s computer. (more…)
I don’t write on the forensics side of security much, but I thought this was an interesting topic that I’d not seen covered much before. While I was doing my research on USB hardware key loggers I learned quite a bit about USB devices that I did not know before. Besides Vendor IDs and Product IDs, some devices also have a serial number associated with them. (more…)
The n770 and n800 are Linux based mobile devices from Nokia that are designed for portable web surfing, Internet Tablets as Nokia calls them. The platform for these devices is know as Maemo and since it’s Linux based many hackers have extended its functionality greatly. Since both models have built in WiFi and Bluetooth, and the older 770 model has come down in price ($130 when I got mine), (more…)
Here I will outline some use full Unix and NT commands for finding out more information about a given IP. Some of these techniques will fail depending on firewall rule sets. (more…)