The Internet of Sonos

Post thumbnail
Post thumbnail
Recently a friend of mine inquired about my opinion on a Sonos (audio) device that was on their network that had been end of life for years. We were deliberating on what the threat landscape was for seemingly harmless devices like this on their network. That’s when I got curious... [Read More]
Tags: IoT Shodan

Hacking Rihanna's Bank Account

Post thumbnail
Post thumbnail
Okay full disclosure, this title is half clickbait. This is actually a story about a scammer claiming to be Rihanna asking me to hack their bank account and send their “brother” money. The majority of this will simply be screenshots of the conversation as it happened. I built a small... [Read More]
Tags: Scammers

Using Password Resets for OSINT

Post thumbnail
Post thumbnail
This post is part practical, but mostly story. I’ll go through how I use password resets on various services to gather fragments of information on someone, alongside a story of how I piece those together to get more definitive information. There may be tools out there that do something similar... [Read More]

Email Spoofing With Powershell

Post thumbnail
Post thumbnail
I had previously written about Email Spoofing With Netcat/Telnet and it was a seemingly instant hit. Even though the same commands were applicable to Windows users through telnet, which is off by default on Windows installations, or netcat if you chose to install it, neither is an immediate “pickup and... [Read More]