Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Explorations in Data Destruction 8: Electric Techniques

Zoz now stages experiments with high voltage as a method to demolish SSD drives and provides a general summary on destruction techniques that work the best. I have to go really fast now with electric. There aren’t too many things in there (see right-hand image). The goal was, you know, we’ve got...

Explorations in Data Destruction 7: Diamond Charge and Blast Suppression

Having conducted enough experiments with the Munroe effect over shaped charges, Zoz decides to try diamond charges and a blast suppression technique. So I feel good about shaped charges, but there’s one other charge I wanted to try, which is a diamond charge (see right-hand image). The EOD folks use these...

Explorations in Data Destruction 6: Oil Well Perforators

Courtesy of a neighboring bomb squad, Zoz gets the chance to play around with oil well perforators by utilizing them in his staged data demolition experiments. Alright, moving on, the bomb squad said to us “Oh, by the way, we have hundreds of these oil well perforators that we want to get rid of. Would...

Explorations in Data Destruction 5: The Munroe Effect

Zoz continues his series of HDD destruction experiments as he gives annular and radial shaped charges a shot and tries the compression welding technique. The stearic acid turns out to be a really important component of this explosive. And if you don’t get that amount right, it doesn’t work. So this is a...

Explorations in Data Destruction 4: Kinetic Methods

This part of Zoz’ research is a 101 on HDD demolition through physical damage rather than heat, so find out what techniques he leveraged and how it all went. Alright, moving on to part 2 – kinetic (see right-hand image). The goal here was to deform, spindle, mutilate the drive, basically, severely...

Explorations in Data Destruction 3: Beyond Straight Thermite

As Zoz keeps experimenting with thermal methods to completely ruin HDDs, he tries more substances based on thermite and draws some interesting conclusions. So alright, I wasn’t ready to give up yet. I know that in military thermite grenades they actually don’t use straight thermite – they use what...

Explorations in Data Destruction 2: Thermal Techniques

Having highlighted the goals and rules for the research, Zoz demonstrates HDD destruction attempts via a couple of thermal methods, including oxygen injection. So method number one, the good old plasma cutter (watch video below). Starting off keeping things simple. I had used plasma cutters many times and I...

Zoz – And That’s How I Lost My Other Eye… Explorations in Data Destruction

This DEF CON 23 presentation by Dr. Andrew ‘Zoz’ Brooks turned out a blast, so read about the ways to destroy data on hard disks, and don’t try this at home. Hello DEF CON! I’m actually going to break with tradition this time and start one minute early, because I have so much shit to show...

Remote Exploitation of an Unaltered Passenger Vehicle 7: Cyber Physical Action

This is the final part of Black Hat USA presentation by Charlie Miller and Chris Valasek, where they show a few demos of what can be done to a car remotely. Charlie Miller: We figured out eventually how to do that. Chris Valasek: These are the Lua scripts that we would use to actually send CAN messages on...

Remote Exploitation of an Unaltered Passenger Vehicle 6: Exploit Chain

The researchers continue looking into the vehicle attack workflow and examine cyber physical internals as well as the checksums to be able to control the Jeep. Chris Valasek: Let’s go through, very simply, how this works. You get on a cell network. You have your cell phone, you have your laptop, you have...