IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Eyal Ronen, Colin O’Flynn, Adi Shamir and Achi-Or Weingarten
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Eyal Ronen, Colin O’Flynn, Adi Shamir and Achi-Or Weingarten
Happy Holidays Cybersecurity Enthusiasts and Ag-Tech Innovators! Grab your overalls, throw on some boots, and get ready for the 2025 CyberTractor Challenge! Join us on June 15-20, 2025 in the heartland of the USA to learn from industry leaders, academic instructors, experts, and our generous sponsors about the exciting field of agriculture cybersecurity! It’s the fourth year of our event, SECOND year as a 501c3 Non-Profit, and we’re bigger and better than ever!
I was reading an article about Telly, a service that will send out free televisions that are ad supported.
I went to their site to see the terms and conditions, wondering if as a security researcher, could I get one to hack on.
As I was reading through their terms, I came across editor notes still in their document.
They have since fix the doc. I thought it was funny they didn't do it before it went live.
As for the question about hacking it, reverse engineering is out of scope of their terms and conditions.
#iothacking
Dumping and extracting the SpaceX Starlink User Terminal firmware
https://www.esat.kuleuven.be/cosic/blog/dumping-and-extracting-the-spacex-starlink-user-terminal-firmware/
#IoTHacking #EmbeddedDevice #FirmwareHacks #vulnerabilities #exploitation
Another popular article series on the @hnsec blog this year — A journey into IoT by @apps3c
https://security.humanativaspa.it/tag/iot/
Chip identification, BUSSide, and I2C
https://security.humanativaspa.it/a-journey-into-iot-chip-identification-busside-and-i2c/
Unknown Chinese alarm – Part 1 – Discover components and ports
https://security.humanativaspa.it/a-journey-into-iot-unknown-chinese-alarm-part-1-discover-components-and-ports/
A journey into IoT – Unknown Chinese alarm – Part 2 – Firmware dump and analysis
https://security.humanativaspa.it/a-journey-into-iot-unknown-chinese-alarm-part-2-firmware-dump-and-analysis/
Unknown Chinese alarm – Part 3 – Radio communications
https://security.humanativaspa.it/a-journey-into-iot-unknown-chinese-alarm-part-3-radio-communications/
More to come soon…!
Pentesting on UART:
Universal Asynchronous ReceiverTransmitter-serial protocol mainly used for debug by vendors (threat vector for getting a shell).Could be found in many embedded and IoT devices
https://negromarco.it/post/uart-essential-for-pentester/
-- Hands on Internet of Things Hacking --
0$ !
Check this out !
#iot #deals #hacking #iothacking
https://store.expliot.io/products/hands-on-internet-of-things-hacking
Hello fellow beginners in IoT ! Here is a tutorial for a UART USB bridge using Flipper Zero and getting a Shell !
https://alrikrr.github.io/posts/flipper-zero/flipper-gpio/uart-bridge-pi4/
#iot #iothacking #FlipperZero #cybersecurity
Im still trying to improve my skills in this field, if you see any fail on my blog, you can DM me 🙏🥹