Memory Acquisition from FBGA Components

Memory Acquisition from FBGA Components

Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 08 April 2013 Accessing memory from embedded devices can be accomplished multiple ways. The easiest methods include using debugging ports or tapping the exposed pins of a Thin...

Penetration Testing Considerations

Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 28 March 2013 John Sawyer pointed me to a blog post Getting the most out of your pentesting by Wendy Nather of 451 Security. I would like to provide a little bit more context in the hopes...
GRC Transmission Analysis: Getting To the Bytes

GRC Transmission Analysis: Getting To the Bytes

Post Author: Don C. Weber [Twitter: @cutaway] Date Published: 15 May 2014 I have not picked up my HackRF Jawbreaker in a while (Figure 0x0). Family and billable work trump side projects. Lucky for me Tom Liston and I started teaching the Assessing and Exploiting...

Welcome to InGuardians Labs Blog!

Original Post Author: Chris Sanders [Twitter: @chrissanders88] Original Date Published: 22 February 2013 All of us at InGuardians are really excited to welcome you to the first post on our InGuardians Labs blog. In addition to consulting, InGuardians prides itself on...