Showing posts with label hacking. Show all posts
Showing posts with label hacking. Show all posts

Thursday, December 10, 2020

A camera that can look inside the keyhole to read the keys pattern!!




Currently $345 USD

The LockTech LTKS KwikSet Decoder is a WIFI enabled digital scope that when used with a compatible IOS or Android Smartphone makes decoding these locks ridiculously easy and fast!

Features:
- Decodes all current SmartKey locks (GEN 1, 2, 3, & 4) and SmartKey Control Key cylinders as well.
- A real glass mirror for the clearest image possible.
- Internal LED eliminates glare off the front of the lock.
- Position Alignment Spacers eliminate the guesswork of where you're looking at in the lock and locating individual wafers/pins during the decoding process.
- LED dimmer allows the user to increase or decrease the brightness inside of the lock.
- Live Video Display Feed, SnapShot Mode, or Video Mode.
- Rechargeable battery
- Magnetic Protective Storage Cap
- Spacers, Protective Cap, and Laminated Depth Chart are tethered for convenience.

 System requirement:

Android 4.2 and iOS 8.0 or later


https://www.internationalkeysupply.com/products/locktech-ltks-wi-fi-enabled-decoder-for-kwikset-smartkey-locks

Friday, November 28, 2014

Infrared thermal Imaging Hack-a-thon


FLIR ONE Hack-a-thon: 

Infrared thermal Imaging Camera for your Smartphone





At the HackerDojo
Start:   Friday, December 12 2014 at 1:00pm
End:    Sunday, December 14 2014 at 9:00am
Contact:
Carlos.Uranga@Hackerdojo.Com; Interim Assistance: Anil.Reddy@Hackerdojo.Com, Jaun.Alvarez@Hackerdojo.Com
Fee: Free for first 50 participants, $15 thereafter per person. Click on the link above to reserve your ticket now!

Details:
Join FLIR and HackerDojo in a 38-hour Hack-a-thon to develop cool and interesting iOS apps for the FLIR ONE!
Cash, products, and promotional prizes for best apps in four categories.

Event Agenda

Friday 12/12
4:00 p.m.- 6:00 p.m. - FLIR ONE Hack-A-Thon Event Kickoff and Keynotes

6:00 p.m.- 12:00 a.m. - FLIR ONE Hack-A-Thon with Hourly Prize Drawings*

*Must be present to win

Saturday 12/13
12:00 a.m.- 12:00 a.m. - FLIR ONE Hack-A-Thon Continues with Hourly Prize Drawings

Sunday 12/14
12:00 a.m.- 8:00 a.m. - FLIR ONE Hack-A-Thon Continues

8:00 a.m.- 12:00 p.m. - Developer Presentations and Demonstrations

12:00 p.m.- 1:00 p.m. - Catered Lunch and Judging

1:00 p.m. - Award Ceremony


Best New App Prizes

1st - $5000 +FLIR ONEs for the entire team + FLIR FX

2nd - $2000 + FLIR ONEs for the entire team + Flir FX

3rd - $1000 + FLIR ONEs for the entire team

4th - $500 + FLIR ONEs for the entire team

5th - FLIR ONEs for the entire team

Additional prizes: Best app in each category - $1000 + FLIR ONEs
App categories: Work, Home, Play, Games/Entertainment


Notes:
Ideally teams of 1-4, hacking the future!

Check back weekly for further updates.


Thursday, May 03, 2012

Researcher Causes Endless Restart Loop on Samsung TV's

https://threatpost.com/en_us/blogs/researcher-causes-endless-restart-loop-samsung-tvs-042412

Italian security researcher Luigi Auriemma was trying to play a trick on his brother when he accidentally discovered two vulnerabilities in all current versions of Samsung TVs and Blu-Ray systems that could allow an attacker to gain remote access to those devices.
Auriemma claims that the vulnerabilities will affect all Samsung devices with support for remote controllers, and that the vulnerable protocol is on both TVs and Blu-Ray enabled devices.
One of the bugs leads to a loop of endless restarts while the other could cause a potential buffer overflow.

Auriemma discovered the issues accidentally. He told Threatpost via email that he was trying to play a trick on his brother. He only wanted to send a remote controller request with a funny message, but he ended up nearly destroying the TV.
To exploit Auriemma’s vulnerabilities requires only that the devices are connected to a wi-fi network.
As background, Auriemma explains that when the device receives a controller packet it displays message informing users that a new ‘remote’ has been detected, and prompts the user to ‘allow’ or ‘deny’ access. Included with this remote packet is a string field used for the name of device. Auriemma found that if he altered the name string to contain line feed and other invalid characters, the device would enter an endless loop.
Auriemma claims that nothing really happens for the first five seconds, but then he lost control of the TV, both manually on the control panel and with the remote. Then after another five seconds, he claims, the TV automaticall restarts. Then the process repeats itself forever, even after unplugging the TV. Eventually, Auriemma managed to reset the TV in service mode. He writes that users can avoid the situation altogether by hitting ‘exit’ when prompted to ‘allow’ or ‘deny’ the new remote device.
As for the buffer overflow, Auriemma determined that he could crash devices by setting the MAC address to a long string. He is only guessing that this is a buffer overflow vulnerability, and he told Threatpost via email that the vulnerability would be much more “attractive” if it was in fact a buffer overflow vulnerability.
“The bugs have been tested on a d6000 and d6050 TV, but it's highly possible that many of the Samsung devices supporting this protocol are vulnerable because d6xxx is a recent TV and usually these 'core' components are like libraries shared with other devices that make use of the same protocol,” he said via email.
Auriemma claims there is no fix for these bugs because he was unable to report the bugs to Samsung. He has also received no word from Samsung. He claims that Samsung doesn’t even have a channel through which to report these types of bugs.

Monday, August 01, 2011

How Face Recognition Can Uncover SSNs

From Slashdot:

"Building on previous work showing that social security numbers are not random, CMU researchers ran experiments in which they predicted students' social security numbers after taking a photo of them with a cheap webcam. Using off-the-shelf facial recognition technology and data-mining publicly available Facebook photos and profile information, they were able to come up with the social security numbers of several of the students. (More impressive, as they note that 60% of the students were foreign, and had no SSNs, leaving them a pool of less than 50)."

bejeweled blitz bot

His code scrapes the screen image as input.  Identifies all of the game pieces then plays the game.

http://hackaday.com/2011/07/30/bejeweled-blitz-bot-makes-your-high-score-look-just-sad/

Screen Scraping is  capturing the screen as a source of still images as input, almost like video.
Then image processing is applied to identify all of the game pieces. This is then used to play the game and inject mouse clicks in to the event queue as if a user had click on the game.

Brilliant work, First time I've seen this done for Flash.  It's an old technique we used it at Well Fargo to get data out of the old IBM 3270 Dumb terminal screens to import in to Unix.