Magspoof – Wirelessly Spoof Magnetic Stripereaders

MagSpoof is a device that can spoof or emulate any magnetic stripe or credit card and it can work wirelessly even on standard magstri...

In hw-hacking, iot-security, Mar 21, 2021

Dinoflux

Jose Ramon Palanco holds a Telecommunications Engineering degree from The University of Alcala de Henares in Madrid. Jose Ramon is th...

Read More

Instagram

All Stories

Magspoof – Wirelessly Spoof Magnetic Stripereaders

MagSpoof is a device that can spoof or emulate any magnetic stripe or credit card and it can work wirelessly even on standard magstripe credit card readers by generating a strong elec...

In hw-hacking, iot-security, Mar 21, 2021

The Right Way to Publish a CVE

A CVE is a dictionary of publicly known cybersecurity vulnerabilities which is intended to uniquely identify and name publicly disclosed vulnerabilities pretraining to specific versio...

In research, Mar 17, 2021

IoT Reversing 101: Discovery

Before we delve into the world of reverse engineering, we need to discuss what engineering as a whole actually is.

In hw-hacking, iot-security, reversing, Mar 15, 2021

The Amazing World of File Fuzzing

The world of File Fuzzing is filled with a truly spectacular display of testing. It is the latest shift in software injection and is worth anyone’s attention. But do you really know w...

In research, Mar 14, 2021

The Ultimate Guide to JTAG

If you are interested in the hacking industry, chances are that you have come across JTAG.Chances are you have used it in the past to reflash some piece of hardware.But how exactly do...

In guides, Aug 09, 2020

RTL and Bladerf

RTL and Bladerf

In RTL Bladerf, Aug 09, 2020

How to Design and Publish Electronic Boards – Everything You Need to Know

The Kitspace, formerly known as Kitnic, is a registry of open-source hardware electronic projects which are ready to order and build.This means that they could be described as thingiv...

In electronic board, Aug 09, 2020

Firmware Reversing: FACT Core

Firmware analysis can be a tough challenge with a lot of tasks involved in its effective execution.Many of these tasks can be done automatically through new approaches or through the ...

In reverse engineering, Aug 09, 2020

deDECTed – DECT Sniffing the Right Way

Before we begin this guide there is something important that needs to be discussed.Recording phone conversations without having consent from the user is highly illegal within the Unit...

In sniffing, Aug 09, 2020

Modern Hash Cracking

When it comes to has-cracking, a hash-cracking program which works on an enormous database of hashes can guess many millions or billions of possible passwords automatically and compar...

In research, Aug 09, 2020