MasterLock Combination Lock Vulnerabilty and Exploit

A couple of weeks ago, I came across an article from Samy Kamkar on how to successfully guess a combination for […]

Shells by Mail: Backdooring USB Devices for Fun and Pwnage

Pretty much everyone is familiar with the most common ways that organizations are breached, weak passwords, misconfigured systems, social engineering, […]

CYA: Cover Your Alfa (Part I)

Those interested in performing this or a similar modification will need at least the following supplies and equipment: A soldering […]