ToorCamp Journal, Day 3: Finally, the Implantation Station

[Editor’s Note: Amal Graafstra was one of hundreds of people who attended ToorCamp, a summer camp for geeks concluding today on the Washington coast. The author of the book RFID Toys and a “double RFID implantee,” Graafstra won a ticket to the event through a GeekWire contest. He has been sending dispatches to give the rest of us a sense for life there, concluding with this post today. PreviouslyArrivalDay 1 and Day 2.]

For me, the ultimate day of ToorCamp was by far the finest, staring with my RFID Implantation Station, the place a number of pleasure on boards and round camp in the end boiled all the way down to only some sign-ups. After organising, I sat round for a couple of half-hour with no person displaying up … however then a passer-by stopped, requested just a few questions, and determined to go for it.

That began the ball rolling and a number of other different bystanders obtained in line. At the desk subsequent to me, folks have been studying methods to construct Geiger counters, WiFi pigeons have been roosting, and rogue robots have been lurking that didn’t honor Asimov’s 3 laws. In complete, 8 folks obtained implants, crowds of spectators watched, and everybody was nonetheless smiling about it at the finish of the day.

After wrapping up the Implantation Station, I nosedived into hack courses. Seattle hacker Parity taught us methods to hack a PIN code out of nearly any HTC Android cellphone, and methods to apply the strategy to different makes and fashions. Then Kos confirmed how you could possibly use a special USB OTG cable to attach your Android cellphone (pre-loaded with instruments and scripts) to a different Android cellphone and pwn it in underneath a minute, having access to pictures, texts, emails, and even your Google account token.

After studying methods to completely destroy anybody with an Android cellphone, I dropped in on the final quarter-hour of an 8 hour .NET software program hacking class placed on by Jon McCoy of Digital Body Guard … and what I noticed in quarter-hour made me cease and re-evaluate my life. Jon has created instruments that permit anybody to simply crack open compiled .NET coded EXE recordsdata and basically re-write it nevertheless they see match, then write out the altered EXE. Which means I might simply add options to complied software program, or change performance, and even repair safety holes that the software program producer both refuses to repair or just hasn’t gotten round to fixing but. There are a number of software program purposes I exploit every day that I want had some function or simply did one thing a barely completely different method, and now I’ve the instruments that not solely make this stuff potential, it makes these adjustments trivial.

I’m headed house now, crammed with a way of disbelief that it’s over, a giddy pleasure as I scheme methods to use what I’ve discovered, and the particular intention to be first ticket holder on the record for subsequent 12 months’s ToorCamp occasion.

Comply with Amal Graafstra on Twitter @amal and find out more on his siteFor extra on ToorCamp, hearken to our recent GeekWire podcast interview with David Hulton, considered one of the organizers of the occasion.

Back to top button