Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
The Private Equity Associate Certification
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive overview of pentesting tools built using Arduino Pro Micro in this conference talk from Derbycon 2018. Dive into various security and compliance aspects, learning about embedded device testing scenarios, logic analyzer software, and TTL analyzer demonstrations. Discover how to build and use tools like EEPROM memory dumpers, AVR programmers for firmware dumping, magnetic strip spoofers, and RFID badge snoopers. Gain insights into Wiegand interception techniques and practical applications of these DIY security tools.
Syllabus
Intro
ABOUT SIKICH
ABOUT SECURITY AND COMPLIANCE
ABOUT KEVIN
PRO MICRO OVERVIEW
BUILDING TOOLS WITH THE PRO MICRO
ADDITIONAL BASIC COMPONENTS
EMBEDDED DEVICE (PUMP SKIMMER) TEST SCENARIO
LOGIC ANALYZER SOFTWARE
TTL ANALYZER DEMO
EEPROM MEMORY DUMPER CONNECTIONS
EEPROM MEMORY DUMPER DEMO
AVR PROGRAMMER/FIRMWARE DUMPER SETUP
AVR PROGRAMMER FIRMWARE DUMPER DEMO
MAGNETIC STRIP SPOOFER BUILD
MAGNETIC STRIP SPOOFER PRO
RFID BADCE SNOOPER
BADGE SNOOPER - MODIFIED RFID READER
BADGE SNOOPER - WIECAND INTERCEPTION
THANK YOU FOR YOUR TIME.