Posts

A beginner guide to Smart Cards

Image
Smart Cards     Since this has been my current subject of interest I'll post a bit here. I'll be focusing on a subset of RFID called smart chips, smart cards, SIM cards, etc. A lot of what I say here is taken from what I've been reading, and my next step is to start interacting with them. This is a really quick introduction. Does this pin out look familiar? Beyond just your phones SIM these are integrated into your credit cards now as well in the US. How weird is that? While the pin out looks the same, they actually very quite heavily with internal technology, looks, etc, but they still use often use T=0 and T=1 protocols to communicate, which if that sounds familiar, are protocols used by GSM. These only store a small amount of information. It's really important to remember that is their primary function as these chips  CAN contain an OS, a CPU, RAM, and applications. The pin-outs are as follows. It is important to know that of the 8 contacts only

Update on my Status

Update on me I have been chilling, still haven't gone back to IT yet except I did go through an interview recently with a company I'm actually interested in working for. I flopped, I couldn't even list 5 bash commands I use when asked during that interview, RIP in pepperonis. I decided a while ago I needed to PoC out my knowledge on github and have been writing quite a bit trying to consolidate resources  I use when going through labs or learning, as well as documents what I read. Maybe it could have helped but it was such a hard stupid moment on my part that I want to crawl into a hole, lay, and rot until work on Monday.  Anyway, my PoC work can be found here https://github.com/64nYm3d3/CheatSheet/ and it's registered under an email not related to this site so I'll update it at some point to reflect the relationship. I wish I had started it much sooner, with so much to add it is a major task and reorganizing and reformatting my notes is a bit challenging. It&

Thoughts on ISSA talk on using AI to automate security

Recently I attended the ISSA presentation in MN, the description of it: The Power and Potential of Robotic Process Automation. And the Security Risks. Please join us on March 22 nd  as we explore the powerful and emerging Robotic Process Automation technology in regards to what IT security professionals need to know about RPA platforms . Robotic process automation (RPA) is a powerful and emerging technology that streamlines and standardizes many human user processes as well as harmonizes different systems across an organization’s environment. So what do IT security professionals need to know about RPA platforms? Very simply, it is a new attack vector and organizations need to start to understand their risk. Because RPA software interacts directly with business applications and mimics the way applications use and mirror human credentials and entitlements, this can introduce risks when the software robots automate and perform routine business processes across multiple

The last few months.

I've picked up a bit. I think, I've got a ways to go.