Hardware hacking, Glitching Attacks, and Tools.

Have you ever wondered how to start breaking hardware? It’s not that hard, and can be a lot of fun. I will talk about basic tools needed to begin, what to look for, and how you too can play with just about any IoT type device. This talk came from the idea of wanting to reset a Point-To-Point radio that no one knew the password for, and was deemed “dead”. I will talk about how I found the admin Interface, and what did once I got connected to it, and a few other stories of hardware attacks I run against systems. I will also introduce the topic of Glitching using an EMP on hardware. It’s fun to see a program branch into code that can never actually be branched into as an exit is not built into the code base.

David M. N. Bryan

David M. N. Bryan

David M. N. Bryan is a Hacker with X-Force Red, IBM’s elite security testing team. David has 25+ years of Information Security experience and knowledge that he uses to create custom attack scenarios for/with our clients. His primary skill sets involve penetration testing embedded computing/hardware, ATMs, and mainframes. David runs and leads many projects, and often acts as a liaison with clients.David has been a defender of security at a top ten bank, setup and secured the DEF CON network, and has run hundreds of engagements with clients. David has been a participant in the information security community for 25+ years, first starting out as a DEF CON volunteer (Goon) - and now is on the board that runs Thotcon, a Chicago Information Security conference. For the last 15+ years David has been the attacker in many scenarios as a penetration tester covering: hardware, mainframe, network, embedded, wireless, web applications, and physical security. David has presented at BlackHat, DEF CON, ToorCon, LayerOne, ToorCamp, BSides Events, and AppSecUSA.

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Hardware hacking, Glitching Attacks, and Tools.

Have you ever wondered how to start breaking hardware? It’s not that hard, and can be a lot of fun. I will talk about basic tools needed to begin, what to look for, and how you too can play with just about any IoT type device. This talk came from the idea of wanting to reset a Point-To-Point radio that no one knew the password for, and was deemed “dead”. I will talk about how I found the admin Interface, and what did once I got connected to it, and a few other stories of hardware attacks I run against systems. I will also introduce the topic of Glitching using an EMP on hardware. It’s fun to see a program branch into code that can never actually be branched into as an exit is not built into the code base.

You'll wish you went sooner!

We proudly present SecretCon, an entirely unparalleled conference for the state of Minnesota, built for our new digital reality. This conference is dedicated to the many specialties of our hacker, cybersecurity, and privacy community. We have taken it upon ourselves to construct a conference that not only embraces our past, but also looks to the future. Join us!