{"id":958,"date":"2020-09-28T16:34:18","date_gmt":"2020-09-28T22:34:18","guid":{"rendered":"http:\/\/dc612.org\/?p=958"},"modified":"2020-09-28T16:34:18","modified_gmt":"2020-09-28T22:34:18","slug":"thursday-october-8th-612pm-virtual","status":"publish","type":"post","link":"https:\/\/dc612.org\/index.php\/2020\/09\/28\/thursday-october-8th-612pm-virtual\/","title":{"rendered":"Thursday, October 8th \u2013 6:12pm @ Virtual"},"content":{"rendered":"\n<p>Hello hackers!<\/p>\n\n\n\n<p>Look around your workspace &#8211; do you have a wireless keyboard or mouse? If so, maybe power them off while <a href=\"https:\/\/twitter.com\/FreqyXin\">@FreqyXin<\/a> is around:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Mousejack and its associated wireless HID attack surface came to notoriety a few years ago, with the help of some exceptionally cheap hardware, and Bastille Labs\u2019 eye-catching web site. The risk that users could be attacked through their wireless mouse or keyboard from major manufactures, certainly rattled more than a few CISOs. During this chat we will talk about Mousejack and the resulting corporate response, from my first chance exposure to the device as an intern, through to being offered a position to lead internal pen testing for uncovering massive exposure within an organization. This is essentially the story of how I broke into the security industry \u2013while still in college, with tales of technical triumphs and hacker pranks for both red and blue team to enjoy.<\/p><\/blockquote>\n\n\n\n<p>Always love a good prank, can&#8217;t wait!<\/p>\n\n\n\n<p>As usual these past few months, we will be meeting online at <a href=\"https:\/\/cafe.cyberia.club\/dc612\">https:\/\/cafe.cyberia.club\/dc612<\/a>.<\/p>\n\n\n\n<p>&#8212; TactiFail<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello hackers! Look around your workspace &#8211; do you have a wireless keyboard or mouse? If so, maybe power them off while @FreqyXin is around: Mousejack and its associated wireless HID attack surface came to notoriety a few years ago, with the help of some exceptionally cheap hardware, and Bastille Labs\u2019 eye-catching web site. The [&hellip;]<\/p>\n","protected":false},"author":2331,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-958","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/users\/2331"}],"replies":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/comments?post=958"}],"version-history":[{"count":2,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/958\/revisions"}],"predecessor-version":[{"id":961,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/958\/revisions\/961"}],"wp:attachment":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/media?parent=958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/categories?post=958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/tags?post=958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}