🛡 IoT Security Digest - #3

Back from DefCon, Hackers can stop trains, Hashcat gets a major upgrade, and more!

We’re back from DefCon! What a great time it was! Specifically the Embedded Systems Village was amazing. CTF was competitive. Demos were cool. Definitely check it out next yaer if you couldn’t make it.

DefCon ESV

In The News

US CISA has warned about a critical flaw, tracked as CVE-2025-1727, in the radio-based linking protocol between End-of-Train (EoT) and Head-of-Train (HoT) systems.

Great writeup here by Spaceraccoon on getting a UART shell on a LAU-G150-C Optical Network Terminal. Also, if you haven’t you should definitely check out his new book.

Vulnerabilities in Gigabyte motherboards could allow attackers with local or remote admin permissions to execute arbitrary code in System Management Mode and potentially bypass secure boot.

Tools of the Trade

Hashcat 7.0 Release

The hashcat we all love just did a major version release that packs a ton of new features. Check it out!

Bleak Python Library

This is my go to python library when I need to write custom BLE service interaction.

Return Value

Returning from DefCon is always an interesting experience. You leave the company of tons of super smart people with lots of ideas of things to learn and build. Time to LOCK IN.