Capture and replay ASK signals ASK (Amplitude-Shift Keying) is a form of modulation used by most garage doors remotes, as well as many car keys, alarm systems and other entry/access control mechanisms. PopFob listens for these radio signals, detecting and extracting any interesting patterns. Detected signal patterns are then saved to one of eight memory slots, matching the eight available pads. The pads light up to indicate a signal has been assigned, and can then be pressed to replay the signal. They also blink anytime the assigned signal is detected again, keeping a score system for easy identification of "interesting" signals. Analyze,...
How secure are your networks? Artio shines a new light on your network to reveal things no other solution can see. Built on our experience with network intrusion, this next-level detection system can identify threats previously kept under the radar. Detect NAC bypass, ghosting, MAC cloning, poisoning and more Artio is the first commercially-available solution to detect Ethernet ghosting / NAC bypass. Artio also detects network scans, partial ghosting / MAC theft, poisoning / MITM (Man-In-The-Middle) and more. Simple integration Artio is packaged as a standard 19" rack-mount unit (1U), with a short depth of only 230mm (including power connector). Detection...
Your favorite switch just got even better The Skunk gets a new version for 2022! Still providing the same features you know and love, the software remains the same but the hardware has had some visible changes. Probably the most obvious is the move from the classic green soldermask to a fresh purple. Some changes are not just cosmetic though: the physical footprint has been reduced quite a bit. From 84x75 mm down to 75x61 mm, the Skunk just got a 27% size reduction. It now takes even less space in your hacker backpack or toolbox. This becomes pretty obvious when...
Weapons-grade MitM Syphoon is a MitM (Man-in-the-Middle) tool - it abuses the network to redirect communications from other hosts through itself. This allows sniffing as well as manipulation of communications between hosts on the network. Beat the network into submission When thinking about MitM, the first thing that comes to mind is often sniffing passwords out of clear-text exchanges. This is a gross oversimplification of what Syphoon is capable of. MitM is only the beginning - Syphoon offers a wide range of tools to extract information, manipulate exchanges, strip SSL, redirect network flows and more. Written exclusively in C and optimized...
After reading many of your messages about the Skunk and its features, I was able to get a better understanding of what most users needed. I took some time the past few days to work on implementing the features that seemed to warrant the highest attention. So here it is (finally): version 1.2.0 of the Skunk firmware. In in this article I will try to present the changes brought along by this new update. A better command-line interface One of the key advantages of the Skunk is the simplicity with which it can be configured, simply by plugging in a...
- 3D print
- Swiss day