020 - Hardwear.io CTF Interviews

Interviews with Hardwear.io CTF contestants and organizers


In this episode, Alvaro interviews contestants and organizers of the Hardwear.io CTF challenge

First, we’re joined by two members of the OpenToAll CTF team. Graziano and Antonius.

The second segment is with one of the creators of the CTF challenge, Philippe Teuwen( @doegox ) from Quarkslab .

The third segment was with Team Pineapple.

Other topics mentioned/covered:

https://csaw.engineering.nyu.edu/ctf

https://nullcon.net

https://www.hitb.org

https://en.wikipedia.org/wiki/Tempest_(codename)

https://www.pjrc.com/teensy/

https://www.arduino.cc

https://www.nongnu.org/avrdude/

Have comments or suggestions for us? Find us on twitter @unnamed_show ,  or email us at show@unnamedre.com .

Music by TeknoAxe ( http://www.youtube.com/user/teknoaxe )

019 - It's Still Not Magic

An interview with Holly Graceful


This week, Holly Graceful ( @HollyGraceful , gracefulsecurity.com ) joined us to talk about her recent hardware reverse engineering blog series and her pen(etration) testing and security career in both public and private sectors. She tells us about how she entered the field via the military and some of those differences.

We discussed breaking down projects into smaller bites. We talk about why getting access to the JTAG (use it for ...) port can be super easy in the consumer product and it may be more calculated than expected. The series ends with some key fob fun.

We do a minor round up of software defined radio and the USRP used with gnuradio .  We catch up on what Alvaro is doing with his SDRs.

Holly is working on more posts so stay follow to be updated with the latest.

Links that came up:

Have comments or suggestions for us? Find us on twitter @unnamed_show ,  or email us at show@unnamedre.com .

Music by TeknoAxe ( http://www.youtube.com/user/teknoaxe )

018 - Ghidra

An Interview with Thomas Daede


Thomas Daede joined us after the Mountain View Reverse Engineering Meetup to talk about Ghidra . Ghidra is the NSA’s newly-released-to-the-public software reverse engineering tool.

The source has not yet been released, but there’s a Ghidra Github placeholder .

Some of the other things we talked about:

Thomas also mentioned @marcan42 ’s example of comparing his own PowerPC code with Ghidra’s decompiled output .

CrowdSupply’ s Teardown conference is coming up in Portland, June 21-23.

BlackHoodie will be back in the SF Bay Area in April .

Women in Security and Privacy ( @wisporg ) has a scholarship program for DEFCON. You can apply for the scholarship online. They’ll cover the DEFCON ticket as well as a $500 stipend for travel/accommodation. If you want to help, you can donate here . Thanks to @RachelTobac for spreading the word! As of this episode, there are 58 scholarships available!

Jen mentioned @pinkflawd’ s tweet about ELF binaries .

Have comments or suggestions for us? Find us on twitter @unnamed_show ,  or email us at show@unnamedre.com .

Music by TeknoAxe ( http://www.youtube.com/user/teknoaxe )

017 - Supercon 2018 Part 2

Various Interviews from the Hackaday Superconference


Jen and Alvaro were at the 2018 Hackaday Superconference !

Sorry for the audio quality, we recorded in a fairly loud environment.

Sarah Petkus and Mark Koch

Rick Altherr

Ruth Grace Wong & Joe Rozner

Piotr Esden & Dominc Spill

Have comments or suggestions for us? Find us on twitter @unnamed_show ,  or email us at show@unnamedre.com .

Music by TeknoAxe ( http://www.youtube.com/user/teknoaxe )

016 - Supercon 2018 Part 1

Various Interviews from the Hackaday Superconference


Jen and Alvaro were at the 2018 Hackaday Superconference !

Sorry for the audio quality, we recorded in a fairly loud environment .

Chris Svec - http://chrissvec.com

Josh Lifton from Crowd Supply .

Richard Whitney from the Happy Robot Company

Alex Glow from Hackster

Chris Gammell from The Amp Hour

Have comments or suggestions for us? Find us on twitter @unnamed_show , or email us at show@unnamedre.com .

Music by TeknoAxe ( http://www.youtube.com/user/teknoaxe )