Free Standard International Shipping for orders over £50
Order by 19th December for UK delivery before Christmas
0 Cart
Added to Cart
    You have items in your cart
    You have 1 item in your cart
    Total
    Check Out Continue Shopping

    How To Read A Schematic

    How To Read A Schematic
    One of the most important things for us about the HIDIOT was to make it a piece of Open Source Hardware. That means that it's possible for you to study it, learn how it's made, modify it, build your own and pretty much do anything you want with it. This freedom might seem a little strange, but it's how hardware used to be for most of the 20th century.

    An important electronics skill is being able to read an electrical schematic. We thought we'd teach you how to read a schematic by reading ours, and comparing it to some similar circuits. Open this link in a new tab for a full-size copy of the schematic to play along with this blog post.

    Read more

    The Road Ahead

    The Road Ahead

    Our new website is now live! I founded Raw Hex in 2014 as a personal blog to teach security testing. A lot has happened since then. The funny thing about having an educational blog while running a consulting practice is that it's impossible to build a routine for building decent content.

    Read more

    Building the Internet of Wrongs

    Building the Internet of Wrongs
    I recently did a talk at BSides London on some of the little toys that I like to build. I've been tinkering with hardware for a few years now and find it fascinating. It's a natural progression from my interests in breaking software, to breaking IoT to building my own stuff for the purposes of improving my understanding of how to break things. People asked me for the slides, but at 300mb I'm not so keen to put them up. Instead I thought I'd write up my talk and show you how to start building your own Internet of Wrongs devices.

    Read more

    The Ultimate Port Scanning Guide: Part 2 - Practical TCP Port Scans

    The Ultimate Port Scanning Guide: Part 2 - Practical TCP Port Scans
    Earlier we looked at the theory behind different types of port scans. Here we'll put the theory into practice and see what we find on a lab network. In this example I have a copy of metasploitable 2 running on IP address 10.0.2.4. If you have a copy of virtualbox, it's worth playing along with this post.

    Read more