<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hardware &#8211; SCRT Team Blog</title>
	<atom:link href="/category/hardware/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Orange Cyberdefense Switzerland&#039;s technical blog</description>
	<lastBuildDate>Tue, 29 Oct 2024 16:19:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>/wp-content/uploads/2024/10/cropped-favicon-32x32-1-32x32.png</url>
	<title>Hardware &#8211; SCRT Team Blog</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Privilege escalation through TPM Sniffing when BitLocker PIN is enabled</title>
		<link>/2024/10/28/privilege-escalation-through-tpm-sniffing-when-bitlocker-pin-is-enabled/</link>
		
		<dc:creator><![CDATA[Julien Oberson]]></dc:creator>
		<pubDate>Mon, 28 Oct 2024 08:45:51 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=6045</guid>

					<description><![CDATA[This blog post offers additional insights following the presentation delivered at the Swiss Cyber Storm conference in Bern on October 22, 2024. Introduction TPM sniffing attacks are well documented and have been used for at least the last five years. In a nutshell, these attacks take advantage of two weaknesses related to the way discrete &#8230; <a href="/2024/10/28/privilege-escalation-through-tpm-sniffing-when-bitlocker-pin-is-enabled/" class="more-link">Continue reading <span class="screen-reader-text">Privilege escalation through TPM Sniffing when BitLocker PIN is enabled</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>TPM sniffing</title>
		<link>/2021/11/15/tpm-sniffing/</link>
		
		<dc:creator><![CDATA[Julien Oberson]]></dc:creator>
		<pubDate>Mon, 15 Nov 2021 13:37:00 +0000</pubDate>
				<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Hardware]]></category>
		<guid isPermaLink="false">/?p=2723</guid>

					<description><![CDATA[TL;DR: we reproduced Denis Andzakovic&#8217;s proof-of-concept showing that it is possible to read and write data from a BitLocker-protected device (for instance, a stolen laptop) by sniffing the TPM key from the LCP bus. Authors: Thomas Dewaele &#38; Julien Oberson Special thanks to Denis Andzakovic for his proof-of-concept and Joe Grand (@joegrand) for his hardware hacking &#8230; <a href="/2021/11/15/tpm-sniffing/" class="more-link">Continue reading <span class="screen-reader-text">TPM sniffing</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Insomni&#8217;hack 2013 &#8211; Life is hard(ware)</title>
		<link>/2013/03/26/insomnihack-2013-life-is-hardware/</link>
					<comments>/2013/03/26/insomnihack-2013-life-is-hardware/#comments</comments>
		
		<dc:creator><![CDATA[blogscrt]]></dc:creator>
		<pubDate>Tue, 26 Mar 2013 15:10:16 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Insomni'hack]]></category>
		<guid isPermaLink="false">/?p=1039</guid>

					<description><![CDATA[Intro For this challenge, I wanted the attendees to reverse a microcontroller firmware, but most of all, I wanted them to actually see the result &#8220;live&#8221; to prove that the code actually works on a real device.&#160;The main idea was to use a keypad and a small screen to display the flag once the correct &#8230; <a href="/2013/03/26/insomnihack-2013-life-is-hardware/" class="more-link">Continue reading <span class="screen-reader-text">Insomni&#8217;hack 2013 &#8211; Life is hard(ware)</span></a>]]></description>
		
					<wfw:commentRss>/2013/03/26/insomnihack-2013-life-is-hardware/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>MagicBox Project</title>
		<link>/2011/04/12/magicbox-project/</link>
		
		<dc:creator><![CDATA[Sergio Alves Domingues]]></dc:creator>
		<pubDate>Tue, 12 Apr 2011 15:50:25 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[arduino]]></category>
		<category><![CDATA[box]]></category>
		<category><![CDATA[electronics]]></category>
		<category><![CDATA[hardware]]></category>
		<guid isPermaLink="false">/?p=572</guid>

					<description><![CDATA[As you may know from our previous posts – and specially if you were there – Insomni&#8217;hack 2011 is now over. As every year we had a lot of fun (and work) creating and developing the challenges and then looking at the teams (mentally) sweating to solve them while we were quietly drinking beer. Despite &#8230; <a href="/2011/04/12/magicbox-project/" class="more-link">Continue reading <span class="screen-reader-text">MagicBox Project</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Mi[fare&#124;fun]: Recyclez vos Abonnements de Transports</title>
		<link>/2011/02/07/mifarefun-recyclez-vos-abonnements-de-transports/</link>
		
		<dc:creator><![CDATA[Sergio Alves Domingues]]></dc:creator>
		<pubDate>Mon, 07 Feb 2011 00:44:24 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<guid isPermaLink="false">/?p=358</guid>

					<description><![CDATA[Introduction Le but de ce petit article est de montrer comment interagir avec une carte (RFID) Mifare Classic à l&#8217;aide d&#8217;un simple bout de code Python afin de, par exemple, s&#8217;en servir au sein de sa propre application. De plus, nous allons prendre comme exemple, non pas une carte vierge, mais une carte normalement dédiée &#8230; <a href="/2011/02/07/mifarefun-recyclez-vos-abonnements-de-transports/" class="more-link">Continue reading <span class="screen-reader-text">Mi[fare&#124;fun]: Recyclez vos Abonnements de Transports</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Reverse engineering de binaires pour GPGPU</title>
		<link>/2011/01/13/reverse-engineering-de-binaires-pour-gpgpu/</link>
		
		<dc:creator><![CDATA[blogscrt]]></dc:creator>
		<pubDate>Thu, 13 Jan 2011 21:49:35 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[CUDA]]></category>
		<category><![CDATA[GPGPU]]></category>
		<category><![CDATA[PTX]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<guid isPermaLink="false">/?p=481</guid>

					<description><![CDATA[Introduction L&#8217;utilisation des GPGPU (General Purpose Graphical Processing Unit) n&#8217;est pas un sujet nouveau dans le monde de la sécurité. De nombreux projets de récupération de mot-de-passe utilisant d&#8217;hors et déjà cette technologie dans le but d&#8217;améliorer leurs performances (pyrit, CUDA multihash bruteforcer, &#8230;).&#160;Lors de la conférence RUXCON 2008, Daniel Reynaud a fait une présentation &#8230; <a href="/2011/01/13/reverse-engineering-de-binaires-pour-gpgpu/" class="more-link">Continue reading <span class="screen-reader-text">Reverse engineering de binaires pour GPGPU</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Analyse du iStorage diskGenie</title>
		<link>/2010/11/02/analyse-du-istorage-diskgenie/</link>
					<comments>/2010/11/02/analyse-du-istorage-diskgenie/#comments</comments>
		
		<dc:creator><![CDATA[blogscrt]]></dc:creator>
		<pubDate>Tue, 02 Nov 2010 10:58:40 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<guid isPermaLink="false">/?p=238</guid>

					<description><![CDATA[Le diskGenie de la societé iStorage est un disque dur externe USB qui a la particularité de chiffrer son contenu et d&#8217;autoriser l&#8217;accès aux données uniquement lorsque l&#8217;utilisateur à saisi un mot de passe. Afin de tester la résistance du disque, de nombreuses pistes ont été explorées afin de valider le fonctionnement correct du disque. &#8230; <a href="/2010/11/02/analyse-du-istorage-diskgenie/" class="more-link">Continue reading <span class="screen-reader-text">Analyse du iStorage diskGenie</span></a>]]></description>
		
					<wfw:commentRss>/2010/11/02/analyse-du-istorage-diskgenie/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>if (&#8216;RFID&#8217;==&#8217;Radio Frequency Insecure Devices&#8217;) {Emulation();}</title>
		<link>/2010/09/18/if-rfidradio-frequency-insecure-devices-emulation/</link>
					<comments>/2010/09/18/if-rfidradio-frequency-insecure-devices-emulation/#respond</comments>
		
		<dc:creator><![CDATA[Sergio Alves Domingues]]></dc:creator>
		<pubDate>Sat, 18 Sep 2010 19:31:37 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<guid isPermaLink="false">/?p=177</guid>

					<description><![CDATA[Précédent : if (&#8216;RFID&#8217;==&#8217;Radio Frequency Insecure Devices&#8217;) {Clonage();} Mise à jour: le lien vers le code source du firmware a été mis à jour. Introduction Nous avons vu précédemment comment tirer parti des tags de type Q5 ou Hitag2, capables de cloner l&#8217;identifiant d&#8217;un tag EM4X02 et ainsi de se substituer à lui auprès du &#8230; <a href="/2010/09/18/if-rfidradio-frequency-insecure-devices-emulation/" class="more-link">Continue reading <span class="screen-reader-text">if (&#8216;RFID&#8217;==&#8217;Radio Frequency Insecure Devices&#8217;) {Emulation();}</span></a>]]></description>
		
					<wfw:commentRss>/2010/09/18/if-rfidradio-frequency-insecure-devices-emulation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>if (&#8216;RFID&#8217;==&#8217;Radio Frequency Insecure Devices&#8217;) {Clonage();}</title>
		<link>/2010/09/10/if-rfidradio-frequency-insecure-devices-clonage/</link>
					<comments>/2010/09/10/if-rfidradio-frequency-insecure-devices-clonage/#respond</comments>
		
		<dc:creator><![CDATA[Sergio Alves Domingues]]></dc:creator>
		<pubDate>Fri, 10 Sep 2010 17:18:28 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<guid isPermaLink="false">/?p=145</guid>

					<description><![CDATA[Précédent : if (&#8216;RFID&#8217;==&#8217;Radio Frequency Insecure Devices&#8217;) {Intro();} Après avoir très (brièvement) introduit les tags RFID EM4X02, nous allons maintenant nous focaliser sur un des moyens permettant de contourner la sécurité d&#8217;un système basé sur ceux-ci: le clonage. Comme nous l&#8217;avons vu précédemment, l&#8217;élément sur lequel repose toute la sécurité du mécanisme est l&#8217;identifiant (soit-disant) &#8230; <a href="/2010/09/10/if-rfidradio-frequency-insecure-devices-clonage/" class="more-link">Continue reading <span class="screen-reader-text">if (&#8216;RFID&#8217;==&#8217;Radio Frequency Insecure Devices&#8217;) {Clonage();}</span></a>]]></description>
		
					<wfw:commentRss>/2010/09/10/if-rfidradio-frequency-insecure-devices-clonage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>if (&#8216;RFID&#8217;==&#8217;Radio Frequency Insecure Devices&#8217;) {Intro();}</title>
		<link>/2010/09/03/radio-frequency-insecure-devices_intro/</link>
					<comments>/2010/09/03/radio-frequency-insecure-devices_intro/#respond</comments>
		
		<dc:creator><![CDATA[Sergio Alves Domingues]]></dc:creator>
		<pubDate>Fri, 03 Sep 2010 09:58:04 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<guid isPermaLink="false">/?p=123</guid>

					<description><![CDATA[Depuis quelques années, le RFID (Radio Frequency IDentification) est omni-présent et largement mis à profit pour des applications aussi diverses que le contrôle d&#8217;accès, le tracking, les systèmes de payement, les systèmes d&#8217;abonnement divers, etc&#8230; Du coup, il n&#8217;est pas étonnant de constater un intérêt grandissant pour ses aspects (in-)sécuritaires et c&#8217;est à cela que &#8230; <a href="/2010/09/03/radio-frequency-insecure-devices_intro/" class="more-link">Continue reading <span class="screen-reader-text">if (&#8216;RFID&#8217;==&#8217;Radio Frequency Insecure Devices&#8217;) {Intro();}</span></a>]]></description>
		
					<wfw:commentRss>/2010/09/03/radio-frequency-insecure-devices_intro/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
