PasteLert Source
Ohhi Archive for pasteLert So i finally got round to putting the source together and writing this out. We’ve been really busy with Blackhat training at work and so on and i’m generally just lazy. Also...
View ArticlepasteLert *facepalm*
Sorry guys, I noticed that I haven’t been getting any pasteLert updates, and i just realised why (see above picture for my reaction). Change line 4 in truncPastes.php from: mysql_query(“truncate...
View ArticleAutomated Moisture Sensor
I’ve always been harping on about growing my own tomatoes and other veggies and earlier this year i attempted it for a while.Unfortunately with me going away for various conferences and generally being...
View ArticleAutomated Water System
So this is going to be a rather strange post as at the time of writing its not actually implemented, the system is built in a waterproof container as well as the networking setup and so on. I figure...
View ArticleFireBridges, proxies that burn!
Overview I’ve always been semi interested in botnets/trojans and targetted attacks and the way they get their data in and out and how the command and control centres work. One of the things i’d usually...
View ArticleJoomla 2.51 Blind SQL Attack
<responsible_disclosure> Before i discuss this, let me just say that the bug has been patched (was in 2.5.1) and at the time of writing this Joomla is already 2 increments away - 2.5.3 is...
View ArticlePasteLert v2!
The Quick and dirty: New PasteLert lives at http://andrewmohawk.com/pasteLertV2/ Downloads: » Interface -> http://andrewmohawk.com/pasteLertV2/src/pastelertv2_Interface.zip » Cron Tasks ->...
View ArticleMagnetic stripes Part 1
Intro So its been nearly a month since I last put a blog post up and I have been working on some stuff in my free time between work (been traveling to the US and took a weekend off to visit some...
View ArticleHacking fixed key remotes
Previously I discussed using my RTL-SDR to merely listen for analog audio signals. In this entry I’ll discuss using it to decode digital signals (this example on fixed remote signals often used for...
View ArticleBypassing LF Entry Systems
Its taken a lot of motivation to start writing this, and I hope its okay, I have a mental block that I need to write this and the second post about magstripes before moving on to some new things with...
View ArticleMagnetic Stripes: Part 2 (Attacking)
I really should have written this after ZaCon (november last year), but I’m lazy. However I have been asked to give a brief overview of the same talk at ITWeb this year so I figure I may as well finish...
View ArticleArduino Watering System: Update
This is just an update on the Arduino watering system, everything seems to be going well whilst I am away (I am away for ~a month, till the end of Blackhat / Defcon). In winter the plants don’t require...
View ArticleKingphisher: Semi-automated phishing
It has been absolutely ages since I have written a blog post – genuinely I really havent simply been slacking off, i’ve just been busy! Anyway, figured it was time to do a writeup on some stuff I have...
View ArticleZaCon V Badge [1/2]: Build Time
I realise I should have done this entry a little sooner, but as everyone should be well aware of by now, I am lazy. Also I moved to Cape Town just after ZaCon V which proved rather time consuming!...
View ArticleHacking fixed key remotes with (only) RFCat
Introduction Its been absolutely ages since I’ve posted anything on the blog, not that I havent been doing things, just really not many things I felt good enough to write an entry about. I got a lot of...
View ArticleHackFu 2016 Writeup
First off let me just say a big thank you to the MWR guys who put this CTF together, usually I don’t partake in CTFs because the skillset required is usually out of my grasp (IANAP). To have developed...
View ArticleHalloween: How to over engineer a mask
Over the years, halloween has always been fun for me, I basically wish I was American so that I could dress up excessively every year! This year I decided that I would like to build my own costume....
View ArticleFireBridges, proxies that burn!
Overview I’ve always been semi interested in botnets/trojans and targetted attacks and the way they get their data in and out and how the command and control centres work. One of the things i’d...
View ArticleJoomla 2.51 Blind SQL Attack
<responsible_disclosure> Before i discuss this, let me just say that the bug has been patched (was in 2.5.1) and at the time of writing this Joomla is already 2 increments away – 2.5.3 is...
View ArticlePasteLert v2!
The Quick and dirty: New PasteLert lives at http://andrewmohawk.com/pasteLertV2/ Downloads: » Interface -> http://andrewmohawk.com/pasteLertV2/src/pastelertv2_Interface.zip » Cron Tasks ->...
View Article