Author Archives: grymoire

A software controlled power supply for $25

The RK6006-BT power supply I had a DPS3003 power supply, and I’ve always found the device difficult to use. There are only 4 buttons and a knob, and the manual was difficult to parse. I noticed a similar power supply … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Compiling GhidraNinja’s Pico Debug’N’Dump

What is the Pico Debug’N’Dump? The Pico Debug’N’Dump is a RPi Pico-based board designed by @ghidraninja used for hardware hacking. It makes use of the Pico capability to provide a flexible platform. In particular, it comes with four different firmware … Continue reading

Posted in Hacking, Hardware Hacking, Linux | Tagged | Leave a comment

Recovering data from a corrupted USB thumbdrive using ddrescue

A friend asked me for help. He has a USB thumbdrive that he used for backup and when he plugged it into his Windows system, Windows wanted to re-format the drive (and therefore erase his backups). Obviously a sub-optimal solution, … Continue reading

Posted in Linux, System Administration, System Engineering, Technology, Uncategorized | Tagged , , , , , , | Leave a comment

Using bash to monitor devices entering/exiting a LAN

Someone asked me for help on a scripting problem, and it seemed both simple and interesting. They had a raspberry Pi set up to control some lights, and they wanted to turn lights on and off if a set of … Continue reading

Posted in Hardware Hacking, Linux, Shell Scripting | Tagged , , , , , , | 1 Comment

Installing pyftdi on Ubuntu 18.04 for FT232H and FT2232H boards

Why use  FT232H and FT2232H boards? I wanted to use a FT232H board for some hardware hacking. The FTDI FTxxx family of devices and boards based on this chip is categorized as a Multi-Protocol Synchronous Serial Engine (MPSSE), which can … Continue reading

Posted in Hacking, Hardware Hacking, Linux, Security | Tagged , , , , , , , , , , , , , , | Leave a comment

Bus Pirate Cables – which is the best?

One of the more useful tools for reverse engineering hardware is a Bus Pirate. However, it does not come with any sort of cable or connector. You can use DuPont connectors, if your device has headers soldered to it. However, … Continue reading

Posted in Hacking, Security | Tagged , , , | Leave a comment

Metasploit+Amazon SES, or debugging Sendmail’s SMTP Authentication

TL;DR: Debugging Sendmail’s SMTP AUTH option is not well documented. I integrated Metasploit Pro with Amazon’s SES/Sendmail, and this describes the debug process I used. We have an Amazon EC2 system using SES (Simple Email Service) running Sendmail.  We use … Continue reading

Posted in Hacking, Linux, Security, System Administration | Tagged , , , , , , , , , | Leave a comment

LetsEncrypt + Amazon EC2 = SSLLabs A Rating

I wanted to easily add web security to a static AWS EC2 website to improve the search rankings. I found a guide by Ivo Petkov however there were a few problems with his instructions. I followed his advice: sudo yum install … Continue reading

Posted in Linux, Security, Shell Scripting, System Administration, System Engineering, Uncategorized, Web Security | Tagged , , , , , , , | Leave a comment

Building a Teensy 3.2 w/SD and 8 position DIP switch + Reset button

I’ve always wanted to build a versatile Teensy-based device for use in physical security penetration testing. I’ve seen Irongeek’s device, and Mike Czumak’s dongle,  but neither of these had an SD card, and only had a 4 of 5 position … Continue reading

Posted in Hacking, Linux, Security | Tagged , , , | Leave a comment

Scanning for confidential information on external web servers

One of my clients wanted us to scan their web servers for confidential information. This was going to be done both from the Internet, and from an internal intranet location (between cooperative but separate organizations). In particular they were concerned … Continue reading

Posted in Linux, Security, Shell Scripting | Tagged , , , , , , , , , , , , , , , , , | 1 Comment