Bricked your Yardstick One? This step-by-step guide shows how to recover it using its cousin, the GreatFET, by erasing, flashing, and verifying full Sub 1 GHz sniffer functionality.
Tag: Hacking
Grounded Flight – Device 2: Root Shell on Flock Safety’s Falcon/Sparrow Automated License Plate Reader
All research was performed against a unit I owned and we did not and do not have any intention of disrupting any existing infrastructure. All disclosures are intended for research purposes only, on devices the researcher owns. Onto the next! In case you missed the previous two posts; where I went over what Flock Safety … Continue reading Grounded Flight – Device 2: Root Shell on Flock Safety’s Falcon/Sparrow Automated License Plate Reader
Plucked and Rooted – Device 1: Debug Shell on Flock Safety’s Raven Gunshot Detection System
All research was performed against a unit I owned and we did not and do not have any intention of disrupting any existing infrastructure. All disclosures are intended for research purposes only, on devices the researcher owns. Well with an introduction to the organization, their services and devices and some other information out of the … Continue reading Plucked and Rooted – Device 1: Debug Shell on Flock Safety’s Raven Gunshot Detection System
Bird Hunting Season – Security Research on Flock Safety’s Anti-Crime Systems
All research was performed against a unit I owned and we did not and do not have any intention of disrupting any existing infrastructure. All disclosures are intended for research purposes only, on devices the researcher owns. This is a introduction and overview post to give some background on the organization and their devices before … Continue reading Bird Hunting Season – Security Research on Flock Safety’s Anti-Crime Systems
The quickest and simplest guide to spinning up a powerful local AI stack. Part 4 – Transcription via Whisper
So it turns out that OpenWeb-UI comes with a form of whisper integration out of the box. So I'm going to cover what changes you should make to make it better, and then I'll include a bonus of a n8n + docker-compose you can use to run a whisper-server + n8n test workflow for it. … Continue reading The quickest and simplest guide to spinning up a powerful local AI stack. Part 4 – Transcription via Whisper
The quickest and simplest guide to spinning up a powerful local AI stack. Part 3 – Image Generation via Stable Diffusion
So as this is the first part that integrates things that aren't included out of the box, I'm going to build these parts out separately and then at the end I'll release my full docker-compose.yml which will have all the pieces. With that in mind, lets get started. First you should go to your users … Continue reading The quickest and simplest guide to spinning up a powerful local AI stack. Part 3 – Image Generation via Stable Diffusion
Sniffing V2X/DSRC with LibreSDR B210/B220 AD9361 on Linux
Continuing with the last post, here's how to conifgure the LibreSDR B210/B220 to sniff V2X/DSRC traffic. First lets install some dependencies: sudo apt install gnuradio gnuradio-dev cmake libsndfile1 libsndfile1-dev Next lets follow this awesome GitHub Repo's instructions Now within GNURadio Companion open the following: /opt/gr-iee802-11/examples/wifi_phy_hier.gcr Now run it then exit GNURadio and reopen it. Now … Continue reading Sniffing V2X/DSRC with LibreSDR B210/B220 AD9361 on Linux
Setting up and configuring LibreSDR B210/B220 AD9361 on Windows and Linux
So for a large project I've spent a month or two on I've been delving deeper into embedded device hacking/penetration testing. I've done some hardware engagements and have messed a bit for fun before, but nowhere to this extent. As apart of these escapades I plan to make a bunch of posts of tips & … Continue reading Setting up and configuring LibreSDR B210/B220 AD9361 on Windows and Linux
CVE-2024-32210, CVE-2024-32211, CVE-2024-32212, CVE-2024-32213 LoMag (Integrator/CE) WareHouse Management
The post discusses the discovery of multiple CVEs in LoMag WareHouse Management, including hard-coded credentials, weak hash usage, and SQL injection vulnerabilities. The author provides insights into their discovery process and highlights the insecure coding practices in the application.
The Hacker’s Search Engine
An all-in-one "hacker" search engine









