C.H.I.P for Hackers

Nov 4, 2016 09:28 PM
Nov 5, 2016 01:47 AM
636138665153649939.jpg

Hello all,

I am new here on null byte and have been her for a while. There was just one problem. I never posted anything! So with the release of the $9.00 C.H.I.P computer I though that I might start a series how how to use C.H.I.P for hacking!

JUST SOME BACKGROUND KNOWLEDGE

The C.H.I.P computer was released late last year an it had forum threads booming because of one particular subject- It was $9.00. With onboard internet, bluetooth and GPIO pins it was amazing! It was the immediate go-to for cheap electronic projects. Although it's good for electronic purposes it is also good for hacking! Need a quick 'physical backdoor'? Although raspberry pi is good for this C.H.I.P is cheaper and doesn't need third-party wireless or bluetooth adapter. It runs of linux so all problems solved.

Now moving on.

What we MIGHT be discussing in this series:

  • physical backdoors
  • hardware hacking
  • evading AVS
  • home protection e.g detects malware and hacking attacks
  • hacking UAVs for example remote control cars and drones
  • and much more!!!

I hope you are exited for the series as I am!

-BOOMERANG

p.s I am sorry If there were any problems as this is my first HOW-TO and I and not as experienced as you

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!