Remove Authentication Remove Linux Remove Open Source Remove Travel
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

In 2013, researcher Nitesh Dhanjani found that a popular brand used simple MD5 hashes of the device's MAC addresses for authentication. Problem is, MAC addresses are not great for authentication. It seemed that once you authenticated through the local network, the app maintain that access, even if you are halfway across the world.

article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

The tools are open source, and Paula has a team of experts that helps build these tools. In addition to her knowledge of Windows, she’s equally versed in Linux and other operating systems as well. Januszkiewicz: Actually we're talking about both of the systems here, a Linux that Windows another world differently.