Making wearables with NodeMCU - FOSDEM 2017Etiene Dalcol
NodeMCU is an open hardware IoT platform based on eLua for the ESP8266 microcontroller. It allows creating low-cost projects using Wi-Fi and easy scripting in Lua, which makes it great for making wearables, for example. In this talk I'll give an introduction to the platform, show how I built an audio reactive graduation dress and share the materials to get you started on your own wearable project. This talk is ideal for beginners to hardware hacking or Lua enthusiasts looking for project inspiration.
Вы узнаете о том, как при помощи syzkaller обнаружить уязвимости ядра Linux. syzkaller — инструмент для фаззинга системных вызовов Linux. Во время тестирования ядра Linux внутри компании Google фаззер нашел более 400 уязвимостей; внешними пользователями также было обнаружено множество ошибок.
DOD 2016 - Ignat Korchagin - Managing Server Secrets at ScalePROIDEA
Operating a large cluster, a datacenter or a distributed network involves dealing with a lot of secrets on your hardware. Almost in any case for any setup you have to deal with at least four types of secrets for each piece of hardware: SSH server key (or shell access key), key to bootstrap your configuration management system, disk encryption key and maybe some per-server credentials to access other services. Also, most of the times, these keys have to be set up before your configuration management kicks in, so automating this process may be hard. Security wise, it is important to control where and when those secrets are generated. Often, keys are generated by startup scripts. However, during initial boot (especially on diskless systems) the system may have low entropy level in its internal random number generator, so generated keys may end up being statistically weak. Once you have your keys, you need to store them somewhere securely. Encrypted disk is a great solution, but guess what? You need a key to access an encrypted disk, so there is a chicken-and-egg problem. Also, where do you store keys for diskless systems? This talk shows an approach how a simple combination of hardware support and little cryptography can deal with above issues and unify and simplify secret management for you hardware fleet.
Kernel Recipes 2013 - kconfig-frontends, a packaging of the kconfig parser an...Anne Nicolas
The configuration language used by the Linux kernel, known as kconfig, has gained some traction in the community, and is increasingly used by third-party projects. The kconfig-frontends package aims at centralising the effort of keeping an up-to-date, out of the Linux source tree, packaging of the kconfig infrastructure, ready for use by third party projects.
The state of the project will be presented: what has been done so far, and ideas on future evolutions. Some kconfig tips and tricks will also be demonstrated.
Jeśli zastanawiałeś się kiedyś nad tym czy Java, .NET i wielkie korporacyjne systemy to jedyne miejsce, gdzie programowanie może być ciekawe to ta prezentacja jest właśnie dla Ciebie!
Z pomocą maluteńkiego modułu z niesamowitym mikrokontrolerem ESP8266 zbudujemy system sterujący oświetleniem, który z powodzeniem może zostać użyty w domu.
Otwórz się na świat Internet of Things i poczuj magię mikrokontrolerów 21-go wieku!
The Deck: a portable, low-power, full-on penetrating testing and forensics system. The Deck runs on the BeagleBoard-xM and BeagleBone. It provides hundreds of security tools
Making wearables with NodeMCU - FOSDEM 2017Etiene Dalcol
NodeMCU is an open hardware IoT platform based on eLua for the ESP8266 microcontroller. It allows creating low-cost projects using Wi-Fi and easy scripting in Lua, which makes it great for making wearables, for example. In this talk I'll give an introduction to the platform, show how I built an audio reactive graduation dress and share the materials to get you started on your own wearable project. This talk is ideal for beginners to hardware hacking or Lua enthusiasts looking for project inspiration.
Вы узнаете о том, как при помощи syzkaller обнаружить уязвимости ядра Linux. syzkaller — инструмент для фаззинга системных вызовов Linux. Во время тестирования ядра Linux внутри компании Google фаззер нашел более 400 уязвимостей; внешними пользователями также было обнаружено множество ошибок.
DOD 2016 - Ignat Korchagin - Managing Server Secrets at ScalePROIDEA
Operating a large cluster, a datacenter or a distributed network involves dealing with a lot of secrets on your hardware. Almost in any case for any setup you have to deal with at least four types of secrets for each piece of hardware: SSH server key (or shell access key), key to bootstrap your configuration management system, disk encryption key and maybe some per-server credentials to access other services. Also, most of the times, these keys have to be set up before your configuration management kicks in, so automating this process may be hard. Security wise, it is important to control where and when those secrets are generated. Often, keys are generated by startup scripts. However, during initial boot (especially on diskless systems) the system may have low entropy level in its internal random number generator, so generated keys may end up being statistically weak. Once you have your keys, you need to store them somewhere securely. Encrypted disk is a great solution, but guess what? You need a key to access an encrypted disk, so there is a chicken-and-egg problem. Also, where do you store keys for diskless systems? This talk shows an approach how a simple combination of hardware support and little cryptography can deal with above issues and unify and simplify secret management for you hardware fleet.
Kernel Recipes 2013 - kconfig-frontends, a packaging of the kconfig parser an...Anne Nicolas
The configuration language used by the Linux kernel, known as kconfig, has gained some traction in the community, and is increasingly used by third-party projects. The kconfig-frontends package aims at centralising the effort of keeping an up-to-date, out of the Linux source tree, packaging of the kconfig infrastructure, ready for use by third party projects.
The state of the project will be presented: what has been done so far, and ideas on future evolutions. Some kconfig tips and tricks will also be demonstrated.
Jeśli zastanawiałeś się kiedyś nad tym czy Java, .NET i wielkie korporacyjne systemy to jedyne miejsce, gdzie programowanie może być ciekawe to ta prezentacja jest właśnie dla Ciebie!
Z pomocą maluteńkiego modułu z niesamowitym mikrokontrolerem ESP8266 zbudujemy system sterujący oświetleniem, który z powodzeniem może zostać użyty w domu.
Otwórz się na świat Internet of Things i poczuj magię mikrokontrolerów 21-go wieku!
The Deck: a portable, low-power, full-on penetrating testing and forensics system. The Deck runs on the BeagleBoard-xM and BeagleBone. It provides hundreds of security tools
This presentations introduces some common protocols used in electronics, and how to sniff/speak them. Then a bit about USB, and some interesting hacks with these things.
Then a bit about openwrt and router hacking.
Suricata: A Decade Under the Influence (of packet sniffing)Jason Williams
Having just celebrated it's 10th birthday, Suricata has learned a lot about monitoring network traffic during the past decade. Suricata today is more than IDS/IPS— it is also a metadata creating, lua scripting, multi threaded, json logging, rule alerting, network security monitoring beast. Development for Suricata is funded by the non-profit Open Information Security Foundation which, along with feedback and support from the community, has made Suricata what it is today. In this talk we will discuss various aspects of modern Suricata, such as deployment, alerting, rule writing, compilation, protocols, lua, and more. Join us for a look into where Suricata has been, what it does today, and where it's going to go in the future.
Thinking of fuzzing applications on OS X can quickly lead to a passing conversation of "ooh exotic Mac stuff", "lets fuzz the kernel" or it can otherwise not be thought of as an exciting target, at least for looking for crashes in stuff other than Safari or the iPhone. While there are some intricacies and nuance involved, workaround for security protections to enable debugging and finding tools that work and work well, this research will detail how it can be done in a reliable way and make the topic more tangible and easier to digest, kind of like how people think about using AFL on Linux: it "just works". We'll explore some of the overlooked attack surface of file parsers and some network services on Mac, how to fuzz userland binaries and introduce a new fuzzer that makes setup and crash triage straightforward while poking at some Apple core apps and clients. Have you ever thought "This thing has got to have some bugs" but think twice because it's only on available on Mac and not worth the effort? If so, you may now find yourself both more motivated and better equipped to do some bug hunting on the sleek and eventually accommodating Mac OS.
Presenting adhocr (abbreviation for Ad-hoc copy and run) as a simple, but powerful UNIX administrator tool. If you like to retrieve data or execute commands on lots of systems simultaneously then this tool is your friend. There is no need to exchange your ssh keys as the power behind adhocr is the expect tool (language). For example, it is plain easy to use adhocr to distribute your public ssh key to all your systems. The real power of adhocr is the central point of logging, which is perfect for \'grep\'ing into stuff you\'re looking for.
You also have the ability to execute commands via the \'sudo su -\' way, which is a blessing in environments where root is not permitted to login directly.
You can even use it monitoring your systems thanks to the powerful error catching.
Linux Kernel Platform Development: Challenges and InsightsGlobalLogic Ukraine
This presentation is about the main tasks which Linux kernel platform engineers take care of. The talk includes real-life cases which help understand the role of respective specialists and might be helpful to those who consider such change in their careers.
The talk was delivered by Sam Protsenko (Software Engineer, Consultant, GlobalLogic) at GlobalLogic Embedded Career Day #2 on February 10, 2018.
More about GlobalLogic Embedded Career Day #2: https://www.globallogic.com/ua/events/globallogic-kyiv-embedded-career-day-2-materials
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
3. libusb
● Usb control
● configure
– Device list (Bus, Device ID, Address)
– UUID(create time, hardID)
● Process
– Event trigger(Address,data)
– Lock device(lock process)
– Unlock (Free)
● Error handle
– Device not exist
– time-out
● Ref:http://funningboy.blogspot.com/2010/03/usb-device.html
● http://www.libusb.org/
4. Libusb->sample flow
● usb_init();
● usb_find_busses();
● usb_find_devices();
● for (bus = usb_busses; bus; bus = bus->next) {
● for (dev = bus->devices; dev; dev = dev->next) {
● open_device();
● Proc();
– Get_ProductID();
– Get SerialNumber();
● close_device();
● }
● }
●
5. libusbmuxd
● Propose
● 'usbmuxd' stands for "USB multiplexing
daemon". This daemon is in charge of
multiplexing connections over USB to an
iPhone or iPod touch.
● The higher-level layers are handled by
libimobiledevice. 'ifuse' is then able to sit on
top of this and mount your device's AFC
filesystem share.
9. ifuse
● Propose
● Access the IPhone file system (root/media/..)
● Protocol
● AFC/AFC2
– AFC is a service that runs on every iPhone / iPod, which
iTunes uses to exchange files with the device and runs
over the usbmux protocol.
– Ref: http://www.theiphonewiki.com/wiki/index.php?
title=AFC
● Ref: http://www.hackint0sh.org/f128/62343.htm
10. ifuse->Top flow chart
● Top flow chart
● Fuse define
– Create fuse
– Parse fuse
– Operate fuse
● Mount
– Check mount is ok?
– Mount handle (lock it)
● Device
– Check device is ok?
– Device handle (usb, lock it)
● AFC
– Start AFC service
● Free Fuse