Physical Security

SANS - Data Center Physical Security Checklist
https://www.sans.org/reading-room/whitepapers/awareness/data-center-physical-security-checklist-416
(Trend Micro) Examples of security threats to a smart factory with IT and OT convergence


(Chatham House) Typical points of vulnerability in industrial control systems

Physical Penetration Testing

Red Team Security Consulting - Physical Penetration Testing


Snowfensive - Convert Entry Assessment


Live Demo

Feb 12, 2019: Xiaomi Scooter Hack
https://github.com/rani-i/Mi365Locker

Jan 15, 2019: A Security Analysis of Radio Remote Controllers for Industrial Applications
Attacks Against Industrial Machines via Vulnerable Radio Remote Controllers: Security Analysis and Recommendations

May 11, 2016: Watch hackers break into the US power grid


USB attacks



29 Different Types of USB Attacks

USB Human Interface Device (HID) attack (a.k.a USB Drive-by)

Feb 9, 2019: O•MG cable (Offensive MG kit)


https://twitter.com/_MG_/status/1094389042685259776
Aug 16, 2018: USBNinja



Feb 7, 2018: Drone Hacking



Aug 18, 2016: USB Kill



May 10, 2016: USB Rubber Ducky


RFID Hacking

Mar 15, 2019: Fujitsu LX901 Keystroke Injection Attack PoC


2019: Radio Sniffing and Replaying Attacks Vs. Alarm System
https://www.linkedin.com/feed/update/urn:li:activity:6501373337233612800

May 23, 2016: Clone RFID Badge


"Shove it" Lock Bypass


Vein Authentication

Hackers Make a Fake Hand to Beat Vein Authentication
https://motherboard.vice.com/en_us/article/59v8dk/hackers-fake-hand-vein-authentication-biometrics-chaos-communication-congress

Fingerprint Authentication

Cloning Fingerprints Like A Boss: 101 Edition
https://medium.com/@LucaBongiorni/cloning-fingerprints-like-a-boss-101-edition-893468ecc826

Dec 27, 2018: Hacking the most popular cryptocurrency hardware wallets

https://securityaffairs.co/wordpress/79367/hacking/cryptocurrency-wallets-hack.html

Defense

Software

Windows Operating System

User Configuration > Administrative Templates > System > Removable Storage Access


User Configuration > Administrative Templates > Windows Components > AutoPlay Policies


Hardware

Popular posts from this blog

Remote Desktop Protocol (RDP) Security

Penetration Testing - Network

Damn Vulnerable Web Services (DVWS) - Walkthrough

Offensive Security Testing Guide

Server Message Block (SMB) Security

Host Configuration Assessment - Windows