Mike Ritland
๐ค SpeakerAppearances Over Time
Podcast Appearances
Definitely those video cables. I'm trying to remember all the different things. We can pull it up, actually. But, yeah, you want to pull it up right now? I can pull it up on the internet. Pull it up. Sweet. All right, cool. So, yeah, let's go through just a few of the pages of the band catalog. I haven't done this in a while, so I'm a little rusty.
Definitely those video cables. I'm trying to remember all the different things. We can pull it up, actually. But, yeah, you want to pull it up right now? I can pull it up on the internet. Pull it up. Sweet. All right, cool. So, yeah, let's go through just a few of the pages of the band catalog. I haven't done this in a while, so I'm a little rusty.
But, yeah, so let's look at just the hardware stuff. We got... Let's see, what is this? This is a short to medium range implant for RF transceiver. This is a component that adds RF to one of the other pieces they have in here, which they call a digital core, to provide a complete implant. So it's kind of like a customizable, build your own, what kind of implant do you need?
But, yeah, so let's look at just the hardware stuff. We got... Let's see, what is this? This is a short to medium range implant for RF transceiver. This is a component that adds RF to one of the other pieces they have in here, which they call a digital core, to provide a complete implant. So it's kind of like a customizable, build your own, what kind of implant do you need?
But, yeah, so let's look at just the hardware stuff. We got... Let's see, what is this? This is a short to medium range implant for RF transceiver. This is a component that adds RF to one of the other pieces they have in here, which they call a digital core, to provide a complete implant. So it's kind of like a customizable, build your own, what kind of implant do you need?
They've put this into various pieces of hardware. There's actually, I think it's over here, Here's kind of another implant. They call this Thief. Lux Rabbit. It's a hardware implant designed specifically for Dell PowerEdge servers. Like a specific one hooks to... It's called a JTAG debugging interface. Basically, a lot of hardware has a debugging interface.
They've put this into various pieces of hardware. There's actually, I think it's over here, Here's kind of another implant. They call this Thief. Lux Rabbit. It's a hardware implant designed specifically for Dell PowerEdge servers. Like a specific one hooks to... It's called a JTAG debugging interface. Basically, a lot of hardware has a debugging interface.
They've put this into various pieces of hardware. There's actually, I think it's over here, Here's kind of another implant. They call this Thief. Lux Rabbit. It's a hardware implant designed specifically for Dell PowerEdge servers. Like a specific one hooks to... It's called a JTAG debugging interface. Basically, a lot of hardware has a debugging interface.
If you get access to that electrically, you can do a whole bunch of stuff. You can implant things at a really low level on that machine. They give you all kinds of access, right? It gives you lots of data. So if you've got an implant that goes into there and hooks up to it, you've got permanent access. Similar to what I was describing with the USB cable,
If you get access to that electrically, you can do a whole bunch of stuff. You can implant things at a really low level on that machine. They give you all kinds of access, right? It gives you lots of data. So if you've got an implant that goes into there and hooks up to it, you've got permanent access. Similar to what I was describing with the USB cable,
If you get access to that electrically, you can do a whole bunch of stuff. You can implant things at a really low level on that machine. They give you all kinds of access, right? It gives you lots of data. So if you've got an implant that goes into there and hooks up to it, you've got permanent access. Similar to what I was describing with the USB cable,
uh with that that covert exfiltration mechanism um but this is baked into the machine so i would imagine the way this happens is during mailing interdiction so you know dell ships a server over to the customer right and our government knows this is happening they grab it in the mail
uh with that that covert exfiltration mechanism um but this is baked into the machine so i would imagine the way this happens is during mailing interdiction so you know dell ships a server over to the customer right and our government knows this is happening they grab it in the mail
uh with that that covert exfiltration mechanism um but this is baked into the machine so i would imagine the way this happens is during mailing interdiction so you know dell ships a server over to the customer right and our government knows this is happening they grab it in the mail
crack it open, put one of these inside, close it back up, send it off to the intended target, and now they've got long-term access inside there. Even if they wipe everything, like down to the hard drives, put new hard drives in, you can still get it right back in. They would have to crack everything open and look at all the hardware to find this type of stuff. Really cool.
crack it open, put one of these inside, close it back up, send it off to the intended target, and now they've got long-term access inside there. Even if they wipe everything, like down to the hard drives, put new hard drives in, you can still get it right back in. They would have to crack everything open and look at all the hardware to find this type of stuff. Really cool.
crack it open, put one of these inside, close it back up, send it off to the intended target, and now they've got long-term access inside there. Even if they wipe everything, like down to the hard drives, put new hard drives in, you can still get it right back in. They would have to crack everything open and look at all the hardware to find this type of stuff. Really cool.
Really cool types of hidden plants.
Really cool types of hidden plants.
Really cool types of hidden plants.