Quantcast
Channel: Nomotion Blog
Browsing latest articles
Browse All 10 View Live

Defense CyberSecurity Requirements – DFARS 252.204-7012 Need To Know

Under the interim rule issued late in 2015 (DFARS 252.204-7012), DoD contractors including small businesses.  For immediate assistance or questions please contact us here The requirements are fairly...

View Article


Image may be NSFW.
Clik here to view.

Modifying a small PCB without a microscope? Improvise!

To continue the trend of hacking everything with a chip on it (IoT), we decided to tear apart a small device from a home security system.   We are on the hunt for root access, but that’s not what this...

View Article


A short ‘subjective’ view on crowdsourcing

Nomotion’s CEO wrote an article for Signal magazine, an AFCEA marketing venture.  While he represents the organization, his views on this topic are quite controversial, maybe even within his...

View Article

Image may be NSFW.
Clik here to view.

Is this normal for sponsored advertising?

While debugging some problems with 64 and 32 bit Chrome (or more precisely, while downloading the different versions), one of our developers found a strange “Sponsored” ad, handed to him by Yahoo’s...

View Article

Image may be NSFW.
Clik here to view.

Exploring the AT&T U-verse 5268AC DSL Modem – Intro

I recently recent swapped from Spectrum to AT&T. Long story short I didn’t like it and switched back. However, I did I notice something interesting and decided to order a device off of ebay to...

View Article


Image may be NSFW.
Clik here to view.

Exploring the AT&T U-verse 5268AC DSL Modem – Part 1

When we last left off we had identified a possible point of attack for the U-verse gateway via a port open to the public internet. Now we will take a quick look at the gateway itself and find a way to...

View Article

Image may be NSFW.
Clik here to view.

SharknAT&To

Note: All ports referenced in the following post are TCP.  Introduction When evidence of the problems described in this report were first noticed, it almost seemed hard to believe. However, for those...

View Article

Image may be NSFW.
Clik here to view.

All your KRACK are belonging to us…

On October 16, researchers at KU Leuven,a Belgian University announced their discovery of a new vulnerability called KRACK that affects many devices which use the WPA/WPA2 authentication protocol....

View Article


Image may be NSFW.
Clik here to view.

Exfiltrate data with a covert shortwave packet radio. – Part 1

Disclaimer: It is the reader’s responsibility to ensure that they obey all applicable laws in their area. Please operate within FCC guidelines. This post’s goal is to examine the benefits and...

View Article


Image may be NSFW.
Clik here to view.

Cracking WiFi without clients: The PMKID method.

For those who don’t already know about the latest finding in the 802.11 world: clients who know the correct PSK are no longer required for WiFi cracking on some access points! In fact all that is...

View Article
Browsing latest articles
Browse All 10 View Live