Now I have a device sending bytes using the BUS..now can I capture what is it going inside this BUS?
And about the second point:
For example Windows (Close Source) has some algorithms inside it.. they encrypts some bytes and use them or send them to some devices.. for example.. and so.. so now can I capture this algorithm?? and how?? Is it hard or easy proces?? again it is close source not open source..and the algorithm is compiled with the OS ofcourse (inside the source)
And also can I encrypt some bytes sent by a BUS without been decrypted or reversed engineering??
Waiting your replies to discuss this point as I want to know much more about it..
Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …