[types field=”intro”]

 

Download HD | Download MP4

 

[types field=”notes”]

Hak5 1205 – Extreme Android and Google Auth Hacking with Kos

11 Comments

  • ARK
    Reply

    The two factor authentication idea with rfid is a good one but the main issue I ran into recently was that the tags are hard to read through skin(at least with the built-in antenna). I recently met Amal Graafstra in person shortly after having a conversation with him online and arranging an f2f meeting. We met at a conference the next day (which until the night before I didn’t know anything about and had to buy a ticket to quickly [14 hours remaining]) and almost immediately I asked if I could scan his S50 NFC capable tag and he accepted. I went to scan it and well, it didn’t work. I couldn’t scan it through his skin and he explained that my antenna wasn’t strong enough (just as Darren’s wasn’t). I was using a Nexus 7 8GB Tablet and I promptly asked Amal if there was a way to replace my battery (where the antenna is located). He said he wasn’t aware of one so now I need to do more research on my own. Oh yay. I had the same two factor authentication plans but unfortunately I don’t have the budget to go ripping my tablet apart to see if I can modify it without consulting tried and true methods like some people so I am now relying on others to find out what can be done (other than a bulky external antenna).

  • Pingback: Hak5 1205 – Extreme Android and Google Auth Hacking with Kos | Nathan Goodfellow: Welcome To My Mind

  • Pingback: Shannon Code » Hackengineering Part 1

  • Pingback: Anonymous

  • Chris
    Reply

    Darren,

    I saw you catch the output of a pipe to grep, just to use in with test in an if condition.
    You can silence gnugrep with a -q flag and use the exit status of grep directly instead of the exit status of test:

    if echo bla | grep -q blah; then echo yay; else echo nay; fi

    No need for the extra call to test (which is what happens when you [ ])

  • Pingback: Undergroundmod | Phone-2-Phone adb Framework

  • balram rexwal
    Reply

    Darren,
    I am using backtrack r5 in virtual box and tried to run p2p adb but it says to add adb in path,
    I tried by adding command “export” in terminal and also by editing .bashrc file, but its again shows same error that add adb to $PATH.which i already define the location of sdk tools loacation by command. and also sh file not runs,
    So,i decide it to run in windows by cygwin in which it now gave a error that BUSYBOX is not in PATH ,install it from play store.
    Means how apk file can be run in windows,
    Please help me in running p2p adb.

  • arya
    Reply

    p2p adb master

    i have install p2p on my phone havi root & busybox installed
    then i run (run.sh )on terminal
    then i conneted my xperia z (nit rooted ) to my rooted device
    than it shows

    error : device offline

    how to slove this error …??

  • arya
    Reply

    p2p adb master

    i have install p2p on my phone havi root & busybox installed
    then i run (run.sh )on terminal
    then i conneted my xperia z (nit rooted ) to my rooted device
    than it shows

    error : device offline

    how to slove this error …..??

  • thehacktools.com
    Reply

    I was recommended this web site by my cousin. I am no longer sure whether or not this put up is written via him as no one else know such designated approximately my difficulty. You are amazing! Thank you!

  • MarvinDBurkin
    Reply

    Simply wish to say your article is as amazing.

    The clearness in your post is simply cool and i can assume you are an expert on this subject.
    Fine with your permission let me to grab your RSS feed to keep updated
    with forthcoming post. Thanks a million and please continue the gratifying work.

  • Air Jordan pas cher
    Reply

    Bienvenue à la sortie pas cher jordans d’air en ligne.
    De là, vous pouvez obtenir jordans bon marché, retro jordan chaussures des femmes, chaussures pour enfants, vente 100% authentique
    et la livraison gratuite à votre porte. – Air Jordan pas cher

  • fb hacker online
    Reply

    Hello there! This is my first visit to your blog! We are a group of volunteers and starting
    a new initiative in a community in the same niche. Your blog
    provided us useful information to work on. You have done
    a marvellous job!

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>