One of the most important things for us about the HIDIOT was to make it a piece of Open Source Hardware. That means that it's possible for you to study it, learn how it's made, modify it, build your own and pretty much do anything you want with it. This freedom might seem a little strange, but it's how hardware used to be for most of the 20th century.
An important electronics skill is being able to read an electrical schematic. We thought we'd teach you how to read a schematic by reading ours, and comparing it to some similar circuits. Open this link in a new tab for a full-size copy of the schematic to play along with this blog post.
Our new website is now live! I founded Raw Hex in 2014 as a personal blog to teach security testing. A lot has happened since then. The funny thing about having an educational blog while running a consulting practice is that it's impossible to build a routine for building decent content.
In parts one and two we looked at the theory and practice that goes into port scans. In this post I'm going to cover off UDP scanning. As we covered the theory in part one, I'll go through a (very) brief recap of the theory then I'll do a deep dive into tools and techniques.
I recently did a talk at BSides London on some of the little toys that I like to build. I've been tinkering with hardware for a few years now and find it fascinating. It's a natural progression from my interests in breaking software, to breaking IoT to building my own stuff for the purposes of improving my understanding of how to break things. People asked me for the slides, but at 300mb I'm not so keen to put them up. Instead I thought I'd write up my talk and show you how to start building your own Internet of Wrongs devices.
Earlier we looked at the theory behind different types of port scans. Here we'll put the theory into practice and see what we find on a lab network. In this example I have a copy of metasploitable 2 running on IP address 10.0.2.4. If you have a copy of virtualbox, it's worth playing along with this post.