Affordable USB Attack Device: Part One
Part one of a multi-part series covering the creation of an affordable USB attack device.
Part one of a multi-part series covering the creation of an affordable USB attack device.
This post outlines and presents the rediscovery, vulnerability analysis and exploitation of a zero-day vulnerability that was originally discovered and exploited by the CIA's "Engineering Development Group".
In the course of research on a smart-alarm system; I Identified six important issues that can be used to bypass or disable different aspects of the alarm system. Five of them by attacking the radio network the alarm system uses, and one via the traditional IP based network.