KellyKeeton dot Com v3.0 reverse engineering life


firewall burrito

I heard someone use the term firewall burrito the other day, I have heard of a firewall sandwich. but whats next? A firewall Pizza? When I googled firewall burrito nothing came up at all… so I figured I would be the first post.

Filed under: Hardware, Nerd No Comments

Decrypt BitLocker FileVault and TrueCrypt Whole disk Encryption!!!

I was just in the conference trying to swipethe memory from a laptop someone left there. Problem is that I had to remove the keyboard,then I broke my little screwdriver and when I did all this I realized I forgot mycan of air. Then it was too late my memory had gone muy loco


This isn’t a "holy crap my shit is 3137h4xor pwnd" but a "wow that’s a cool hack" sort of like Xbox running Linux oran oscilloscope that can print vector graphics from pong. This would be a cool Spytrick or uber 31337 bad guy. But if you wanted to get around it. You just use encryptedfile mounts. I woudl imagine that the protection on the temporary mounts is protectedor you just time out unmount the encrypted mount.


A elementary way to do this is the old keylogger.Works every time. I bet you arnt checking your docking station keyboard everymorning? (thankyou centas for the use of the building custodial jumpsuit for accessto your office)


I think the big thing here is dont let badguys finger your ram!


Did you see all the things that will causeproblems....


I do want a copy of the RAM2USB boot applicationthey have, as that would be handy in uses other then just hacking "secret keys"


or be totally insane and checkthis out


technology and security is slow

Things are very slow in the security world, I havent seen anything that is interestinglately. However in hardware hacking there is this way coool scope hack.


Filed under: Hack, Hardware No Comments

bluetooth mac database

while looking up a contact for a possible presentation attention grabber, i ran into this site. I was just saying to my self the other day wouldn't it be great if someone catalogedall the bluetooth mac addresses so I knew what I was looking at.

Filed under: Hardware No Comments

wireless keyboard hack

damn, someone beat me to this, I have been working on this for a long time. I hopeto get the source so that I can see where I was wrong…

Wireless Keyboard DeCryption

Filed under: Hack, Hardware No Comments

Wireless Threats Paper

a good paperwritten for threats to wireless that people don't always think of, or are upcoming(with .11n) but more important tools that cause the threats.

remember that the best wireless security is wireless that is 100% air-gap. huh? putyour wireless on a separate link (buy a dsl line for your company for example) thenrequire that any use to your network is thru SSL or IPSEC VPN

Filed under: Hardware No Comments

lock that shopping cart

a co-worker pointed out that shopping carts now have anti-theft. Further ideas about lockingthem while people were shopping are too funny, but leaveit to the internet. Someone has allready done the shoppingcard lock. Great use of radio waves with the coil to pick up the data and replay it.

Filed under: Hack, Hardware No Comments

interesting hacking

is this legal? either way, its a hack. frogautomation

Filed under: Hardware No Comments

cool solder Iron hack

a cool cheap mod I found (look around this guys site for more fun)

Make your own variable soldergun

Filed under: Hardware No Comments

rc airplane head tracker video

go watch all the videos by this guywho made a cockpit view out of his RC airplane. Then if you want to know moreor make your own…

forum for how to more forum buythe head tracker for the camera servo anda tiny Altimeter

Filed under: Hardware No Comments