Part1: Low Powered and High Risk: Possible Attacks on LoRaWAN Deviceshttps://www.trendmicro.com/en_us/research/21/a/Low-Powered-but-High-Risk-Evaluating-Possible-Attacks-on-LoRaWAN-Devices.html Part2: Gauging LoRaWAN Communication Security with LoraPWNhttps://www.trendmicro.com/en_us/research/21/b/gauging-lorawan-communication-security-with-lorapwn.html Part3: Protecting LoRaWAN Hardware from Attacks in the Wildhttps://www.trendmicro.com/en_us/research/21/c/protecting-lorawan-hardware-from-attacks-in-the-wild.html Thanks to TrendMicro & Sébastien Dudek for those excellent articles about LoRaWAN security
After the previous article related to JTAG there is a new article from KudelskiSec research team member Nicolas Oberli about “SWD – ARM’s alternative to JTAG”This article show how work and how to to use ARM’s SWD using an HydraBus with HydraFw
Excellent article from KudelskiSec research team member Nicolas Oberli about “Build Your Own Hardware Implant” This article show how to do that using an HydraBus with HydraFw Is it possible your #hardware is spying on you? @KudelskiSec research team member Nicolas Oberli is on a mission to find out how practical it is to do […]
HydraNFC Shield v1.0 Specifications HydraNFC Shield v1.0 is an NFC shield hardware (to be plugged on top of HydraBus) to sniff/read/write/emulate any 13.56MHz NFC tags for anyone interested in advanced NFC Research/Dev/Debug/Hack/PenTest on NFC products. It has been designed to be used with HydraBus but can also be used with other MCU. HydraNFC Shield v1.0 […]
HydraBus v1.0 is an open source multi-tool hardware for anyone interested in Learning/Developping/Debugging/Hacking/Penetration Testing for basic or advanced embedded hardware. The MCU is one of the fastest Cortex M4F on the market and is more than 40X faster than an Arduino (STM32F405, 32bits@168MHz=210DMIPS vs Arduino Uno, 8bits@16MHz=5.2DMIPS). HydraBus can be also used as Test Bench […]