«
Expand/Collapse
19 items tagged "pandora"
Related tags:
pandora fms [+],
vulnerability [+],
site [+],
cross [+],
sql [+],
sony [+],
scripting [+],
request [+],
psp [+],
prometheus project [+],
path [+],
lecture [+],
injection [+],
initial program loader [+],
inclusion [+],
forgery [+],
file [+],
chaos communication congress [+],
authentication [+],
pandora radio [+],
hacks [+],
video [+],
traditional broadcasts [+],
there [+],
shaun gehring [+],
raspberry [+],
radio [+],
player [+],
pandora console [+],
open pandora [+],
open [+],
modern [+],
mix [+],
linux [+],
internet radio player [+],
handhelds [+],
hack [+],
beagleboard [+],
airplay [+],
Hardware [+],
ARM [+],
fms [+]
-
-
11:14
»
Hack a Day
[Shaun Gehring] wanted an Internet radio player. Although he did have some troubles along the way, the final project turned out very well. Housed inside this case which used to house a spindle of bland CDs is a Raspberry Pi that plays Pandora radio and serves as an AirPlay receiver. The GPIO header of the [...]
-
-
12:01
»
Hack a Day
This mix of modern and retro acts as a standalone Pandora client. It’s certainly a radio upgrade, falling somewhere in between the passive listening of traditional broadcasts, and the complete control of music players that use playlists. Inside the wooden case a BeagleBoard does most of the work. It’s running Ubuntu 12.04 on which pianobar, [...]
-
-
21:30
»
SecDocs
Tags:
games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony's hardware, software and business practices ended up completely destroying the hand held's security including some previously unreleased information about how it was achieved. As one of the original authors of the free PSP SDK, various hacking and development tools as well as being a member of the Prometheus project (better known as team C+D) I am in a unique position to discuss many of these aspects of PSP cracking from bitter experience. The Playstation Portable has been the battle ground between Sony and a small group of hackers for close on three years with Sony implementing new security measures and bug fixing firmware updates to keep people out, all the while the hackers have found more unprotected areas to go after. What nobody had realised was Sony had lost from day one. The lecture will go into detail on a number of different topics related to the cracking of the PSP. An overview of how Sony tried to make the system secure will be presented, to give an idea of how it was supposed to work. Then details about the various classes of attacks that were successfully made against the device and how they each related to a failure in Sony's implementation in one way or another. There will also be discussion on how the firmware was so easily taken apart and what mistakes Sony made in making their design "cleaner" while giving the attackers means to extract kernel information. The final part will describe roughly how in the end the security was completely defeated culminating in Pandora's Battery and the customised initial program loader (IPL). A lot of this talk could be taken generally as a lessons learned lecture for Sony's designers, hopefully they don't take much of it on board.
-
21:30
»
SecDocs
Tags:
games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony's hardware, software and business practices ended up completely destroying the hand held's security including some previously unreleased information about how it was achieved. As one of the original authors of the free PSP SDK, various hacking and development tools as well as being a member of the Prometheus project (better known as team C+D) I am in a unique position to discuss many of these aspects of PSP cracking from bitter experience. The Playstation Portable has been the battle ground between Sony and a small group of hackers for close on three years with Sony implementing new security measures and bug fixing firmware updates to keep people out, all the while the hackers have found more unprotected areas to go after. What nobody had realised was Sony had lost from day one. The lecture will go into detail on a number of different topics related to the cracking of the PSP. An overview of how Sony tried to make the system secure will be presented, to give an idea of how it was supposed to work. Then details about the various classes of attacks that were successfully made against the device and how they each related to a failure in Sony's implementation in one way or another. There will also be discussion on how the firmware was so easily taken apart and what mistakes Sony made in making their design "cleaner" while giving the attackers means to extract kernel information. The final part will describe roughly how in the end the security was completely defeated culminating in Pandora's Battery and the customised initial program loader (IPL). A lot of this talk could be taken generally as a lessons learned lecture for Sony's designers, hopefully they don't take much of it on board.
-
-
21:47
»
SecDocs
Tags:
games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony's hardware, software and business practices ended up completely destroying the hand held's security including some previously unreleased information about how it was achieved. As one of the original authors of the free PSP SDK, various hacking and development tools as well as being a member of the Prometheus project (better known as team C+D) I am in a unique position to discuss many of these aspects of PSP cracking from bitter experience. The Playstation Portable has been the battle ground between Sony and a small group of hackers for close on three years with Sony implementing new security measures and bug fixing firmware updates to keep people out, all the while the hackers have found more unprotected areas to go after. What nobody had realised was Sony had lost from day one. The lecture will go into detail on a number of different topics related to the cracking of the PSP. An overview of how Sony tried to make the system secure will be presented, to give an idea of how it was supposed to work. Then details about the various classes of attacks that were successfully made against the device and how they each related to a failure in Sony's implementation in one way or another. There will also be discussion on how the firmware was so easily taken apart and what mistakes Sony made in making their design "cleaner" while giving the attackers means to extract kernel information. The final part will describe roughly how in the end the security was completely defeated culminating in Pandora's Battery and the customised initial program loader (IPL). A lot of this talk could be taken generally as a lessons learned lecture for Sony's designers, hopefully they don't take much of it on board.
-
-
15:01
»
Hack a Day
There’s very few users out there who actually have their hands on an Open Pandora Console. But the ones who do might find this hack useful for getting TV out up and running. It’s actually not hard at all, but if you don’t want to alter the hardware on the device you’ll first have to [...]
-
-
21:24
»
Packet Storm Security Exploits
Pandora FMS versions 3.1 and below suffer from authentication bypass, os command injection, remote SQL injection, remote file inclusion and path traversal vulnerabilities.
-
21:24
»
Packet Storm Security Recent Files
Pandora FMS versions 3.1 and below suffer from authentication bypass, os command injection, remote SQL injection, remote file inclusion and path traversal vulnerabilities.
-
21:24
»
Packet Storm Security Misc. Files
Pandora FMS versions 3.1 and below suffer from authentication bypass, os command injection, remote SQL injection, remote file inclusion and path traversal vulnerabilities.