Un nuevo paso al frente en mini ordenadores
- December 10, 2015
- tuxotron
- 64bit Quad Core ARM A53 1.2GHz CPU
- Dual Core Mali 400-MP2 GPU
- 512MB DDR3 SDRAM
- MicroSD Slot Supports up to 256GB
- 10/100 Mb Ethernet port
- 2 x USB 2.0 host
- 4K x 2K HDMI port
- 3.5mm Stereo Output mini-jack with Microphone Support
- Muti-Channel Audio output through HDMI
- Real-Time Clock capability built in
- Built in 3.7V Lithium battery charging circuit
- 64bit Quad Core ARM A53 1.2GHz CPU
- Dual Core Mali 400-MP2 GPU
- 1GB DDR3 SDRAM
- MicroSD Slot Supports up to 256GB
- 10/100/1000 MB Ethernet port
- 2 x USB 2.0 host
- 4K x 2K HDMI port
- 3.5mm Stereo Output mini-jack with Microphone Support
- Muti-Channel Audio output through HDMI
- Real-Time Clock capability built in
- Built in 3.7V Lithium battery charging circuit
- 5 Megapixel Camera Port
- 4 lanes MIPI video Port
- Touch Panel Port Included
- 64bit Quad Core ARM A53 1.2GHz CPU
- Dual Core Mali 400-MP2 GPU
- 2GB DDR3 SDRAM
- MicroSD Slot Supports up to 256GB
- 10/100/1000 MB Ethernet port
- 2 x USB 2.0 host
- 4K x 2K HDMI port
- 3.5mm Stereo Output mini-jack with Microphone Support
- Muti-Channel Audio output through HDMI
- Real-Time Clock capability built in
- Built in 3.7V Lithium battery charging circuit
- 5 Megapixel Camera Port
- 4 lanes MIPI video Port
- Touch Panel Port Included

Raspberry Pi, C.H.I.P., Beaglebone, Arduinos… El mercado de los mini ordenadores no para de moverse, nuevos modelos más potentes, menos potentes, pero más pequeños, etc. Cada uno de ellos perfecto para ciertos proyectos, muy asequibles e ideales para juguetear. El objetivo de la mayoría de estos es el acercar la tecnología a todos los rincones del mundo.
Y mi personalmente me encanta Raspberry Pi, pero para ser honestos, no cumple con su objetivo principal, el de ser ordenador muy barato enfocado a la educación. A mi lo que más me atrae es el interfaz GPIO que me permite conectarlo sensores y otros periféricos para poder construir algún tipo de dispositivo “inteligente”, nicho en el que los Arduinos en algunas ocasiones sean una mejor opción.
Como éramos pocos, parió la abuela. Un nuevo mini ordenador ha sido anunciado vía Kickstarter que en características y precio tiene pinta de llevarse de calle a los anteriormente mencionados, su nombre Pine A64.
Actualmente hay 3 modelos: PINE64, PINE64+ y PINE64+ 2GB.
PINE64 cuesta 15 dólares y tiene las siguientes características:


Cómo podéis ver, salida de vídeo 4K, hasta 2 GB de memoria, red de 1GB (en los dos modelos superiores), reloj en tiempo real, conexión de baterías, etc.
Éste sí que creo podría ser un ordenador para la educación y otros menesteres a nivel de usuario. Aquí os dejo el vídeo de presentación:
Pine64 [KGVID width=“640” height=“360”]https://ksr-video.imgix.net/projects/2120524/video-616152-h264_high.mp4[/KGVID]
Presentaciones y vídeos de DefCamp #6
- December 8, 2015
- tuxotron
- A new Hope - CTF stories & IoT Hacking - Slide - Video
- Game of Hacks: Play, Hack & Track - Slide - Video
- (In)Security of Embedded Devices' Firmware – Fast and Furious at Large Scale - Slide - Video
- IoT Security - Slide - Video
- IoT Security - Slide - Video
- From Hype Hangover to Happy Hacking: Shaping the World through Shaping Actions - Slide - Video
- A new Hope - CTF stories & IoT Hacking - Slide - Video
- What's in a name? DNS use for exfiltration, and monitoring for detection - Slide - Video
- Finding media bugs in Android using file format fuzzing - Slide - Video
- White hat hacker bounty program to improve online environment security - Slide - Video
- ELK stack for Hackers - Slide - Video
- When Steganography Stops Being Cool - Slide - Video
- Integrating Mobile Devices into Your Penetration Testing Program - Slide - Video
- Toward large-scale vulnerability discovery using Machine Learning - Slide - Video
- Breaking in Bad (I'm the one who doesn't knock) - Slide - Video
- Modern approaches to Wi-Fi attacks - Slide - Video
- Building a Weaponized Honeybot (part I) - Slide - Video
- Building a Weaponized Honeybot (part II) - Slide - Video
- Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts - Slide - Video
- Defending the Enterprise Against Network Infrastructure Threats - Slide - Video
- Challenges on Reversing Layered Malware - Slide - Video
- How to mess with Android Intents - Slide - Video
- Cryptography – our weapon in the 21st century - Slide - Video
- Luke 8:17 – Misleading implementations that compromise the privacy and information security - Slide - Video
- Building a Cyber Security Operations Center - Slide - Video
- Pentesting Android Applications - Workshop - Slide - Video
- What's in a name? DNS use for exfiltration, and monitoring for detection - Slide - Video
- IDS Evasion Techniques - Slide - Video
- Untrusted Mobile Applications. State of Art of Security App-Apocalypse - Slide - Video
- IoT Village Awards - Slide - Video
- Hacking and Securing Network Monitoring Systems: End-to-end walkthrough example on Ganglia - Slide - Video
- Orange about Bug Bounty and Innovation Labs 2016 - Slide - Video
- Abstract Apoc@lypse Technique - Slide - Video

Pues para que no nos aburramos durante las vacaciones, aquí tenéis material nuevo. En este caso de DefCamp #6.
Material de Zero Nights 2015, incluido los talleres
- December 7, 2015
- tuxotron
- “A praise for hackers”
- "Hacking Virtual Appliances"
- "Browser Fuzzing with a Twist (and a Shake)"
- "Warranty Void If Label Removed - Attacking MPLS Networks"
- “Big problems with big data - Hadoop interfaces security”
- “Mathematical theory of input validation vulnerabilities and attacks”
- «Cisco IOS shellcode – all-in-one»
- "Introducing Choronzon: an approach to knowedgebased evolutionary fuzzing"
- "Samsung SmartTV: how-to to creating insecure device in today’s world"
- "Did you get your token?”
- "Fix it yourself: resolving UEFI vulnerabilities single-handedly"
- "Attacking hypervisors using firmware and hardware"
- "Direct X – direct way to Microsoft Windows kernel"
- "Hack like a movie star: Step-bystep guide to crafting SCADA payloads for physical attacks with catastrophic consequences"
- "Modifying the firmwares of industrial switches"
- “Getting The Most Out Of CSP: a Deep Dive”
- "illusoryTLS: Nobody But Us Impersonate, Tamper, and Exploit"
- "How to build your own Echelon system? Attacks at 3G modems"
- "EESIL – universal IL (Intermediate Language) for Radare2"
- "S[c][/c]rum is all around. How to stop continuous integration"
- "KNX security or how to steal a skyscraper"
- "Extracting the painful (blue) tooth"
- “Cross-platform reversing with Frida”
- "Enlarge your Burp, or How to stop fearing Javadocs"
- “Practical exploitation of AVR MC-based devices”
- “On the way to (wrong) anonymity. Basic techniques of digital contraception and private data hygiene”
- “Software vulnerabilities of Yota communication equipment”
- “Distributing the reconstruction of high-level intermediate representation for large scale malware analysis”
- “Hooked browser network based on BeEF and Google Drive”
- “ORM2Pwn: exploiting injections in Hibernate”
- “What should a hacker know about WebDav? Vulnerability review in WebDav implementations”
- “Knowledge based approach for fast Internet resource discovery or Data Mining in the service of nmap”
- “Correlating security events with Esper”
- “Fighting against Flash 0-day: a hunt for a tainted vector”
- “Banking Trojans: a look from the new perspective”
- “Automation of web applications scanning: experience of Yandex”
- “Do-it-yourself banking SDL”
- “Let’s play the game: One more way to perform penetration test”
- Presentation

Ya está disponible el material de la conferencia Zero Nights 2015. No sólo las de las charlas, sino también de los talleres!
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec