Charlie Miller takes an in depth look at a common embedded controller used in Lithium Ion and Lithium Polymer batteries.
In this talk Charlie will demonstrate how the embedded controller works, reverse engineer the firmware and show how to completely reprogram the smart battery by modifying the firmware on it.
Knowledge is the life of the mind
In electronic systems and computing, firmware is “the combination of a hardware device, e.g. an integrated circuit, and computer instructions and data that reside as read only software on that device”. As a result, firmware usually cannot be modified during normal operation of the device.
Firmware is held in non-volatile memory devices such as ROM, EPROM, or flash memory. Changing the firmware of a device may rarely or never be done during its economic lifetime; some firmware memory devices are permanently installed and cannot be changed after manufacture.
Most of it is vulnerable for the same reasons the firmware the Equation Group targeted is vulnerable: it was never designed to be secure. Most hardware makers don’t cryptographically sign the firmware embedded in their systems nor include authentication features in their devices that can recognise signed firmware even if they did. Read more
There is more of an administrator level access to it and there is a key for that. It turns out that Apple never changes those, so you can just look up on the Texas Instruments site and find what those passwords are and use them.
According to Miller, these controllers can be hacked in a fairly straightforward manner. By reprogramming the microcontroller’s firmware, a battery could report a much lower internal voltage or current, causing the charger to overcharge the battery. In Miller’s testing, he was only successfully able to turn a series of seven $130 MacBook Pro batteries into expensive bricks, but he told Ars that it may be possible to cause fire or even an explosion. Read more
ONE OF THE most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer hard drive’s firmware with malicious code. Read more
Apple left default passwords in batteries, making them vulnerable to hacks, explosion
Apple Laptop Batteries Can Be Bricked, Firmware Hacked
Apple laptops vulnerable to hack that kills or corrupts batteries
Battery Firmware Hacking: Inside the innards of a Smart Battery
Change your thoughts and you change your world
Videos from the same category or videos related to the subject.
You will find something new to watch and expand your knowledge.
An update about the Honey project and the development of the CIC News engine.
Short demo using the passthrough option of Pyrit which eliminates the need for giant tables taking up all your hard drive space.
In the Free City of Hamburg a coalition of hackers, activists and other players of civil society have drafted the most revolutionary Freedom of information law in the world.
The details of reversing software running on Android is a scarce. This talk will explore the filesystem, memory, and reverse engineering techniques in-depth.
Many websites mix secure and insecure content on the same page this makes it possible to steal all the data entered on such a page easily, using Moxie Marlinspike’s new SSLstrip tool. I will give a brief explanation and demonstration of the technique.
This talk introduces Trabbler, the first highly versatile “cross site scripting Trojan”. In the talk, we will discuss Trabbler ́s architecture and code and give practical examples of its application.
This talk will is intended to understand where and how the digital conflicts are conducted today but we will dig deeply into the future.
Ben Smith presents new malicious abuses of printers as well as some fun new uses for old attacks.
I will demonstrate both local and remote attacks on ATMs, and I will reveal a multi-platform ATM rootkit. Finally, I will discuss protection mechanisms that ATM manufacturers can implement to safeguard against these attacks.
Ever wondered what is in these blocks of squares on postal packages, letters and tickets?
We deauthenticate the victim from his own wireless network and wait until he connects to our access point. When the victim connects, he is redirected to a service page asking for the WPA-2 key.
Charlie Miller will take an in depth look at a common embedded controller used in a battery and reverse engineer the firmware.
David Litchfield is recognized as one of the world’s leading authorities on database security.
After a short introduction on the differences of IPv4 to IPv6, the weaknesses in IPv6 will be shown. Highlight of the talk is the presentation of the THC-IPV6 Attack Toolkit.
The talk uses fresh examples of application cryptography successes and failures, and also incorporates the new OWASP ESAPI.
We will describe the process of setting up the test network we operate at 29C3, what legal and technical challenges we have faced, and we will describe the actual installation at the CCH.
In this presentation we propose an approach and hybrid shellcode detection method, aimed at early detection and filtering of unknown 0-day exploits at the network level.
This talk will focus on building a phishing framework on top of Metasploit that pentesters can use to automate phishing and increase their overall capabilities.
The first part of the talk provides a brief history of Storm Worm focusing on the actual propagation phase. Afterwards we describe the network communication of the bot in detail and show how we can learn more about the botnet.
This video is made by EXALT and shows a reenactment of a remote hack he did on a Damn Vulnerable Linux (DVL) box.
This talk ends the myth of unbreakable SIM cards and illustrates that the SIM cards are plagued by implementation and configuration bugs.
Using Linux and a device with 2 network cards, I will demonstrate how to configure an undetectable transparent bridge to inject a rogue device onto a wired network that is secured via 802.1x using an existing authorized connection.
This presentation will delve into the science and process behind secure code review and will continue to discuss a simplified approach to secure code review
This talk details how we have abused some of the most popular and recommended Firefox addons, with previously unreleased vulnerabilities. Demos will cover remote code execution, local file disclosure and other tailored Firefox Addon exploits.
Johnny Long reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques.
Tom Scott explains the insecure ways in which some websites deal with passwords.
This talk will discuss the past methods used for XSS defence that were only partially effective. Learning from these lessons, will also discuss present day defensive methodologies that are effective, but place an undue burden on the developer.
Believe you can and you’re halfway there
A collection of videos organised or just select a video by the first impression.
That choice is up to you.
Just click and be surprised
Find what you're looking for