First, when we crack hashes, we aren't usually calculating the full hash value. We often have opportunities for early reject, meet in the middle, partial reversing, etc.
@Evil_Mog@godacity_@TinkerSec@strategy_rpg@seventhsec Second, when cracking hashes, we aren't transferring the calculated hash values back to the host CPU. That would be absurd. We use things like bitmaps, bloom filters, etc. to to tell us what buffer positions had positive hits on each kernel iteration.
Sep 20, 2021 • 31 tweets • 11 min read
There's home medical test kits for damn near everything these days, but the @YoSpermsTest is among the most interesting.
It's an @internetofshit microscope that analyzes your gentleman's relish & records video of it.
It looks neat, so let's hack it!
This 🧵 could get messy...
This little brick is the "YO Device", It's USB powered and you connect to it via WiFi.
Simple enough to use: spooge into the cup, mix in the supplied powder, load your load onto the slide, pop it in the YO Device, and it counts the swimmers. ~15m from "finish" to finish.
Jan 25, 2021 • 16 tweets • 3 min read
1. I've turned my entire house into a faraday cage with EMI shielding paint and window film to mitigate wardriving and TEMPEST attacks. Each device is isolated on its own VLAN and the router only permits Internet traffic between the hours of 03:05 and 04:21.