AndrewNohawk

Blog

CodingSecurity

HackFu 2016 Writeup

First off let me just say a big thank you to the MWR guys who put this CTF together, usually I don’t partake in CTFs because the skillset required is usually out of my grasp (IANAP). To have developed this CTF in a manner that allows people who do not work with crypto/hackz0r wizardry¬†to still…

Hardware HacksRadioRTLSDR

Bypassing Rolling Code Systems

This blog post will discuss the implementation of Codegrabbing / RollJam, just one method of attacking AM/OOK systems that implement rolling codes (such as keeloq) — these systems are commonly found on modern vehicles and entry systems such as gates and garages. This technique has been used and spoken about for a number of years…

CodingRadioSecurity

Hacking fixed key remotes with (only) RFCat

Introduction Its been absolutely ages since I’ve posted anything on the blog, not that I havent been doing things, just really not many things I felt good enough to write an entry about. I got a lot of feedback regarding my previous entry about Hacking Fixed key remotes¬†and I decided to build on that slightly….

GeneralHardware HacksSecurity

ZaCon V Badge [2/2]: How they work

The ZaCon badges were a ton of work on the hardware side (see ZaCon V Badge [1/2]: Build Time), however they provided their own challenges on the software side as well. Since my knowledge of chipsets only extended to the Arduino the badges are essentially a complete Arduino without the UBS->FTDI breakout. This means that…

GeneralHardware Hacks

ZaCon V: Badge Sneak Peak *update*

UPDATE: For those people that missed the friday night the code and slides are here: Slides: https://www.andrewmohawk.com/Badger Badger Badger.pptx Code: https://github.com/AndrewMohawk/zaconv/   MAGICELECTRONICBADGES Ever since I first saw something Joe Grand, Adam Laurie or the Ninja networks team built I have loved the idea of having hackable electronics. So much that every year before ZaCon…