Featured image of post Hacking with Raspberry Pico: Terminal Text Injection and File Stealing

Hacking with Raspberry Pico: Terminal Text Injection and File Stealing

The Raspberry Pico is a small form factor microcontroller used in several application areas: DIY sensor capture, controlling screens, and even for hacking. With full access to its USB stack via MicroPython/CircuitPython and an additional library, the Pico can be programmed as a physical hacking device. It will act as an USB HID or storage device, but inject keystrokes into the host system.

Featured image of post Raspberry Pico: USB Hacking Device Programming

Raspberry Pico: USB Hacking Device Programming

Small form-factor single board computers and microcontroller are an ubiquitous stack in electronic projects. An interesting application area for these devices is physical hacking, e.g. using an USB connection to a host system to inject commands, gain system access, or steal files. To my surprise, an entry level microcontroller, the Raspberry Pico, can be used for these nefarious tasks.

Featured image of post Turning the Raspberry Pi Zero into a Hacking Gadget

Turning the Raspberry Pi Zero into a Hacking Gadget

Single Board Computers with the ability to run a full-fledged Linux distribution can be used as portable devices for a wide variety of use cases. To my surprise, one of them is computer hacking. I was astonished about the creativity and ease-of-use how a Raspberry Pi, Raspberry Pi Zero or Pico can be used for potentially nefarious activities. And after a long deliberation, I decided to start writing blog posts about this subject.

Featured image of post Hashicorp Vault CLI Part 9: Managing Encryption Keys

Hashicorp Vault CLI Part 9: Managing Encryption Keys

Hashicorp Vault provides many features, and the secure storage of encrypted data and secrets is at its heart. Secrets engines are dedicated plugins that govern this storage. They can be grouped into builtin, application and services, cloud, and encryption keys. While all secret engines provide a REST API for interaction, some Vault builtin engines also have dedicated CLI commands.

Featured image of post Hashicorp Vault CLI Part 6: Authorization

Hashicorp Vault CLI Part 6: Authorization

With Hashicorp Vault, the secure management of secrets and encrypted data becomes a manageable task. Thanks to its plugin architecture, functional extensions that target authentication, secrete creation, and short-lived access to system can be implemented and adapted to meet changing requirements.

Featured image of post Hashicorp Vault CLI Part 5: Vault Enterprise

Hashicorp Vault CLI Part 5: Vault Enterprise

The Hashicorp Vault CLI binary is a multi-purpose tool offering several commands for all configurational and operational aspects. This article investigates two commands available in Hashicorp Vault enterprise: Connecting with managed cloud platform instances, and using namespaces.