home.social

#hardwarehacking — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #hardwarehacking, aggregated by home.social.

  1. The ESP32 Has Quietly Become One of the Most Interesting Hacker Devices Alive

    Expensive hardware often becomes ornamental. People baby it. They curate it. They build identities around owning it. Cheap hardware gets modified until it resembles evidence recovered from a flooded basement.

    cha1nc0der.wordpress.com/2026/

  2. Anyone interested in my journey tearing down some AirTies Air 4920 ? (a really annoying WiFi Mesh extender that is firmware coupled to an ISP and specific routing setup).

    AFAICT nobody else has done this yet, but it's also not super exciting...I managed to solder in some UART pins and get to the pre-boot environment as well as the busybox shell.

    I'm debating whether to just mess around with it for my own interest or spend a bit of time documenting it and making a post on my site about it.

    #hardware #hardwarehacking #airties #air4920 #uart #serial

  3. Its been a while since I just stat down and installed Linux on something that has no business having Linux on it.... today I bring you the Microsoft Surface RT (We all know RT stands for Really Terrible), a ARM32 machine running Windows 8 RT from 2012 that Microsoft pretty quickly gave up on.

    Lets install Linux.

    📺 YouTube: youtu.be/UbpHdumMVPQ

    🌐 PeerTube: tube.devwithzachary.com/w/wkvp

    #Linux #OpenSource #Sustainability #MicrosoftSurface #HardwareHacking #postmarketOS #DevWithZachary

  4. Planning to get hands-on with activities & contests at #BSidesKC2026?

    We have prizes up for grabs across the entire con, with the Corelight CTF, EnterpriseKC CTF, Scavenger Hunt Lockpicking Village, and Best Human vs. Best AI! For some activities, you might benefit from bringing along a laptop!

    🔗 Last-minute tickets & activity info: linktr.ee/bsideskc

    #BSidesKC #InfoSec #CTF #Cybersecurity #KansasCity #BadgePirates #HardwareHacking #Lockpicking

  5. This Saturday at the #BSidesKC2026 closing ceremonies! @badgepirates are hosting the ultimate showdown: Best Human vs. Best AI — LIVE, with a Lunar Lander showdown.

    Bring your phone or laptop & visit the Hardware Hacking Village to learn how to participate. For extra fun, bring your badge from last year, though it is not required!

    Info here: github.com/carlfugate/lunarlan

    #BSidesKC #BadgePirates #HardwareHacking

  6. Neat hack. A python woo that reads CAN BUS data from USB and displays the data in the browser. The browser part is cool, the the predefined data management is a gold mine if you are into car hacking or hypermiling or whatever.

    hackaday.com/2026/04/21/can-bu

    #canbus #hardwarehacking

  7. Laser-based hardware attacks are only for nation-state actors with million-dollar labs. Right?
    Wrong.
    At BSides312, Larry Trowell and Sam Beaumont (PANTH13R) from NetSPI built affordable laser tools using an open-source microscope and consumer-grade lasers to detect hardware malware and supply chain chip swaps.
    Hackers go pew pew.
    May 16th. Chicago.
    🎟️ bsides312.org
    #BSides312 #InfoSec #HardwareHacking #SupplyChainSecurity #CyberSecurity #Chicago #BSides #THOTCON

  8. Genuinely wigging out about AI taking my job. Like, actually losing sleep over it.

    My grand strategy: pivot to OT/ICS and hardware. Hardware because AI doesn't have hands (yet?). OT/ICS because I assume people still prefer their facilities/cars/planes to not explode when the AI goes the extra mile.

    Is it a good plan? Probably no. Do I have a backup? Also no.

    Looking for some assurance I’m crazy and wrong or correct and doing the right thing.

    #infosec #icssecurity #hardwarehacking #careeradvice #offensivesecurity

  9. Mais registros da Tosconf[6] 🏴‍☠️

    Liberamos mais gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo: Rodando código em máquina de cartão de crédito, com o Lucas Teske.

    🔗 Assista na íntegra: peertube.lhc.net.br/w/9FSknQ9z

    #tosconf #hackerspace #campinas #hardware #hardwarehacking

  10. Mais registros da Tosconf[6] 🏴‍☠️

    Liberamos mais gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo: Rodando código em máquina de cartão de crédito, com o Lucas Teske.

    🔗 Assista na íntegra: peertube.lhc.net.br/w/9FSknQ9z

    #tosconf #hackerspace #campinas #hardware #hardwarehacking

  11. Mais registros da Tosconf[6] 🏴‍☠️

    Liberamos mais gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo: Rodando código em máquina de cartão de crédito, com o Lucas Teske.

    🔗 Assista na íntegra: peertube.lhc.net.br/w/9FSknQ9z

    #tosconf #hackerspace #campinas #hardware #hardwarehacking

  12. Mais registros da Tosconf[6] 🏴‍☠️

    Liberamos mais gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo: Rodando código em máquina de cartão de crédito, com o Lucas Teske.

    🔗 Assista na íntegra: peertube.lhc.net.br/w/9FSknQ9z

    #tosconf #hackerspace #campinas #hardware #hardwarehacking

  13. Mais registros da Tosconf[6] 🏴‍☠️

    Liberamos mais gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo: Rodando código em máquina de cartão de crédito, com o Lucas Teske.

    🔗 Assista na íntegra: peertube.lhc.net.br/w/9FSknQ9z

    #tosconf #hackerspace #campinas #hardware #hardwarehacking

  14. This Is What a Personal Surveillance System Actually Looks Like

    You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run.

    cha1nc0der.wordpress.com/2026/

  15. This Is What a Personal Surveillance System Actually Looks Like

    You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run.

    cha1nc0der.wordpress.com/2026/

  16. This Is What a Personal Surveillance System Actually Looks Like

    You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run.

    cha1nc0der.wordpress.com/2026/

  17. This Is What a Personal Surveillance System Actually Looks Like

    You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run.

    cha1nc0der.wordpress.com/2026/

  18. This Is What a Personal Surveillance System Actually Looks Like

    You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run.

    cha1nc0der.wordpress.com/2026/

  19. Get ready to do some hands-on learning during #BSidesKC2026 at the Soldering & Hardware Hacking Village in less than a month - 4/25!

    Led by the legendary Badge Pirates & proudly sponsored by banSHEE cybersecurity! Whether you’re a seasoned pro or have never touched a soldering iron in your life, come through to learn, hack, and maybe even walk away with something you built yourself.

    🎟️ Don't wait until we're sold out—grab your tickets now:
    linktr.ee/bsideskc

    #BSidesKC #HardwareHacking

  20. Os registros da Tosconf[6] estão no ar! 🏴‍☠️
    Liberamos algumas gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo, confira a apresentação da Helena "molocohorror" Carreço sobre um tema sensacional de segurança e NFC: "Passe Livre: clonando cartões de transporte capixabas".

    🔗 Assista na íntegra: peertube.lhc.net.br/w/ttDsUHTS

    #tosconf #hackerspace #campinas #hardware #nfc #hardwarehacking

  21. Os registros da Tosconf[6] estão no ar! 🏴‍☠️
    Liberamos algumas gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo, confira a apresentação da Helena "molocohorror" Carreço sobre um tema sensacional de segurança e NFC: "Passe Livre: clonando cartões de transporte capixabas".

    🔗 Assista na íntegra: peertube.lhc.net.br/w/ttDsUHTS

    #tosconf #hackerspace #campinas #hardware #nfc #hardwarehacking

  22. Os registros da Tosconf[6] estão no ar! 🏴‍☠️
    Liberamos algumas gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo, confira a apresentação da Helena "molocohorror" Carreço sobre um tema sensacional de segurança e NFC: "Passe Livre: clonando cartões de transporte capixabas".

    🔗 Assista na íntegra: peertube.lhc.net.br/w/ttDsUHTS

    #tosconf #hackerspace #campinas #hardware #nfc #hardwarehacking

  23. Os registros da Tosconf[6] estão no ar! 🏴‍☠️
    Liberamos algumas gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo, confira a apresentação da Helena "molocohorror" Carreço sobre um tema sensacional de segurança e NFC: "Passe Livre: clonando cartões de transporte capixabas".

    🔗 Assista na íntegra: peertube.lhc.net.br/w/ttDsUHTS

    #tosconf #hackerspace #campinas #hardware #nfc #hardwarehacking

  24. Os registros da Tosconf[6] estão no ar! 🏴‍☠️
    Liberamos algumas gravações das palestras em nosso canal do Peertube para quem não pôde comparecer ou quer rever os conteúdos.

    Neste vídeo, confira a apresentação da Helena "molocohorror" Carreço sobre um tema sensacional de segurança e NFC: "Passe Livre: clonando cartões de transporte capixabas".

    🔗 Assista na íntegra: peertube.lhc.net.br/w/ttDsUHTS

    #tosconf #hackerspace #campinas #hardware #nfc #hardwarehacking

  25. In my free time over the coming weeks and months, I’ll be working on a new version of my pentest dropboxes for IT and OT, and I’ll be turning the projects “Lemon” and “Motion”, which are still on paper, into reality.

    And since people keep asking, I don’t have a sponsor and pay for everything out of my own pocket because that’s the only way I can stay creative and independent.

    #Cybersecurity #OT #IT #Network #Hardwarehacking #SCADA #ICS #Research #OpenSource #foss

  26. OSINT Isn’t About Skill Anymore. It’s About Systems

    There’s a moment, if you spend enough time in this space, where your attention changes. You stop looking at individual data points as things to extract. You start seeing them as inputs to a larger structure.

    cha1nc0der.wordpress.com/2026/

  27. OSINT Isn’t About Skill Anymore. It’s About Systems

    There’s a moment, if you spend enough time in this space, where your attention changes. You stop looking at individual data points as things to extract. You start seeing them as inputs to a larger structure.

    cha1nc0der.wordpress.com/2026/

  28. OSINT Isn’t About Skill Anymore. It’s About Systems

    There’s a moment, if you spend enough time in this space, where your attention changes. You stop looking at individual data points as things to extract. You start seeing them as inputs to a larger structure.

    cha1nc0der.wordpress.com/2026/

  29. OSINT Isn’t About Skill Anymore. It’s About Systems

    There’s a moment, if you spend enough time in this space, where your attention changes. You stop looking at individual data points as things to extract. You start seeing them as inputs to a larger structure.

    cha1nc0der.wordpress.com/2026/

  30. OSINT Isn’t About Skill Anymore. It’s About Systems

    There’s a moment, if you spend enough time in this space, where your attention changes. You stop looking at individual data points as things to extract. You start seeing them as inputs to a larger structure.

    cha1nc0der.wordpress.com/2026/

  31. From Raw Data to Actionable Intelligence Without Leaving My System

    The room is quiet except for a fan that shouldn’t be that loud. Not the kind of noise you notice at first. It creeps in. A low mechanical breath that suggests something is working harder than it should. On the desk, a phone face-down, a laptop half-closed, a terminal window still alive somewhere beneath the sleep state. Nothing dramatic. Just the kind of setup most people would call normal. It isn’t. Most people think intelligence happens after the data leaves their system. They ship […]

    cha1nc0der.wordpress.com/2026/

  32. Ziemlich viel Arbeit: Erstes MacBook Neo mit 1 TByte großer SSD

    Die SSDs, die Apple beim Neo mitliefert, sind nur 256 oder 512 GByte groß. Ein Aufrüsten ist aufgrund verlöteter NAND-Module schwierig. Aber es geht.

    heise.de/news/Ziemlich-viel-Ar

    #HardwareHacking #Mac #Macbook #macOS #Mobiles #FlashSpeicher #SSD #news

  33. Ghidra is free, extensible, and helpful for reverse engineering firmware, but its learning curve is steep...

    In this blog post, Adam Bromiley shares tips and tricks that make firmware reversing less painful, from finding the load address and interrupt vector table, through to defining a proper memory map and making better use of strings, scripts, LLMs, and more.

    It's a guide built from real research projects and a lot of hours spent in front of Ghidra’s UI.

    📌Read here: pentestpartners.com/security-b

    #ReverseEngineering #FirmwareSecurity #Ghidra #HardwareHacking #CyberSecurity

  34. Really great talk about a very interesting problem: creating VMs that can run unmodified device firmware to emulate complicated devices like routers.

    youtube.com/watch?v=f-LTMUFQzjQ

    #defcon33 #hardwarehacking