<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Fracture Labs Blog Posts on Fracture Labs - Relentless Pursuit of Unbreakable.</title>
    <link>https://www.fracturelabs.com/posts/</link>
    <description>Recent content in Fracture Labs Blog Posts on Fracture Labs - Relentless Pursuit of Unbreakable.</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 25 Feb 2026 17:35:10 +0000</lastBuildDate>
    <atom:link href="https://www.fracturelabs.com/posts/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Passkeys for Business: Choosing the Right Implementation</title>
      <link>https://www.fracturelabs.com/posts/passkeys-for-business/</link>
      <pubDate>Tue, 24 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/passkeys-for-business/</guid>
      <description>How should your organization implement passkeys? Compare hardware security keys (roaming authenticators) with built-in device options (platform authenticators) to find the right balance of security and cost.</description>
    </item>
    <item>
      <title>DEEP608 Conference - Rise of the Machines, Fall of the P@ssw0rd1</title>
      <link>https://www.fracturelabs.com/posts/deep608-rise-of-the-machines-fall-of-the-password/</link>
      <pubDate>Tue, 13 May 2025 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/deep608-rise-of-the-machines-fall-of-the-password/</guid>
      <description>Fracture Labs presents at DEEP608 regarding the past, present, and future state of passwords and how technology affects password security.</description>
    </item>
    <item>
      <title>AEM Product Safety Conference - Cyber Risk is Business Risk: Securing Modern Manufacturing</title>
      <link>https://www.fracturelabs.com/posts/aem-cyber-risk-is-business-risk-securing-modern-manufacturing/</link>
      <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/aem-cyber-risk-is-business-risk-securing-modern-manufacturing/</guid>
      <description>Fracture Labs presents at the AEM Product Safety Conference to explore how evolving cyber threats are impacting manufacturers and what leaders can do to strengthen their security posture, reduce risk, and protect operation</description>
    </item>
    <item>
      <title>DEEP608 Conference - IoT: The &#39;S&#39; Stands for Security</title>
      <link>https://www.fracturelabs.com/posts/deep608-iot-the-s-stands-for-security/</link>
      <pubDate>Tue, 02 Apr 2024 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/deep608-iot-the-s-stands-for-security/</guid>
      <description>Fracture Labs presents at DEEP608 regarding the risks IoT devices pose to organizations and what can be done to reduce the risk.</description>
    </item>
    <item>
      <title>RF Replay Attacks: Hacking Christmas Tree Lights</title>
      <link>https://www.fracturelabs.com/posts/rf-replay-attacks-hacking-christmas-tree-lights/</link>
      <pubDate>Mon, 02 Jan 2023 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/rf-replay-attacks-hacking-christmas-tree-lights/</guid>
      <description>Fracture Labs uses Christmas tree lights as an example of how easy it is to hack poorly implemented RF communication found in many IoT devices.</description>
    </item>
    <item>
      <title>Effective Spring4Shell Scanning and Safe Exploitation</title>
      <link>https://www.fracturelabs.com/posts/effective-spring4shell-scanning-exploitation/</link>
      <pubDate>Wed, 06 Apr 2022 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/effective-spring4shell-scanning-exploitation/</guid>
      <description>Scanning for and exploiting the Spring4Shell vulnerability can be tricky, but this post will show you how to scan more effectively using custom tools from Fracture Labs</description>
    </item>
    <item>
      <title>IoT Security Sessions - ESC San Jose 2021</title>
      <link>https://www.fracturelabs.com/posts/iot-security-sessions-embedded-systems-conference-san-jose-2021/</link>
      <pubDate>Wed, 11 Aug 2021 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/iot-security-sessions-embedded-systems-conference-san-jose-2021/</guid>
      <description>Joe Hopper shares his expertise in IoT security at the 2021 Embedded Sytems Conference in San Jose. &amp;lsquo;Live Hack: Exposing Common IoT Security Weaknesses&amp;rsquo; and &amp;lsquo;Internet of Insecure Things: Through the Eyes of a Hacker.&amp;rsquo;</description>
    </item>
    <item>
      <title>Hardware Hacking Lab: Analysis Tools</title>
      <link>https://www.fracturelabs.com/posts/hardware-hacking-lab-analysis-tools/</link>
      <pubDate>Wed, 17 Feb 2021 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/hardware-hacking-lab-analysis-tools/</guid>
      <description>Check out part two in our Hardware Hacking Lab series, where we show you what you need in order to build your own lab. We walk you through the analysis tools we use to perform our smart device penetration testing.</description>
    </item>
    <item>
      <title>Hardware Hacking Lab: Physical Tools</title>
      <link>https://www.fracturelabs.com/posts/hardware-hacking-lab-physical-tools/</link>
      <pubDate>Thu, 14 May 2020 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/hardware-hacking-lab-physical-tools/</guid>
      <description>We&amp;rsquo;ve kicked off a Hardware Hacking Lab series, where we show you what you need in order to build your own lab. In part one, you&amp;rsquo;ll learn what physical tools we use to perform our smart device penetration testing.</description>
    </item>
    <item>
      <title>Exploiting MS17-010 on Windows Embedded 7 Devices</title>
      <link>https://www.fracturelabs.com/posts/exploiting-ms17-010-on-windows-embedded-7-devices/</link>
      <pubDate>Mon, 26 Jun 2017 21:57:50 -0500</pubDate>
      <guid>https://www.fracturelabs.com/posts/exploiting-ms17-010-on-windows-embedded-7-devices/</guid>
      <description>The Windows SMB remote code execution vulnerability patched by MS17-010 has resulted in widespread attacks against Windows 7 devices. While much of the focus has been on patching desktops and servers, many organizations to continue to neglect devices running the Windows Embedded 7 OS because a public exploit hasn&amp;rsquo;t existed - until now. Check out how we patched the NSA&amp;rsquo;s Fuzzbunch tool to demonstrate the importance of patching all devices in a timely manner.</description>
    </item>
    <item>
      <title>Threat Intel RSS Feeds via Twitter Lists</title>
      <link>https://www.fracturelabs.com/posts/threat-intel-rss-feeds-via-twitter-lists/</link>
      <pubDate>Fri, 07 Dec 2018 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/threat-intel-rss-feeds-via-twitter-lists/</guid>
      <description>Many security researchers take time to publish their scripts, tips, successes, and failures on Twitter for all to see. As a security professional, it&amp;rsquo;s important to learn how to effectively use Twitter so you don&amp;rsquo;t miss anything, but how do you manage to sift through everything? Check out this post on how to turn your Twitter Lists into manageable RSS feeds so you can stay on top of what&amp;rsquo;s important to you!</description>
    </item>
    <item>
      <title>Search Breach Data Quicker with AWS Athena</title>
      <link>https://www.fracturelabs.com/posts/quicker-breach-data-queries/</link>
      <pubDate>Fri, 05 Jan 2018 09:04:33 -0500</pubDate>
      <guid>https://www.fracturelabs.com/posts/quicker-breach-data-queries/</guid>
      <description>Most password breach files are organized by user account, but it can be beneficial to search by domain name instead. That can take far too long for massive breach files, so check out this post that shows you how to harness the power of AWS Athena to quickly find the data you need for your next penetration test!</description>
    </item>
    <item>
      <title>Secure Static Website Deployment</title>
      <link>https://www.fracturelabs.com/posts/secure-static-website-deployment/</link>
      <pubDate>Mon, 14 May 2018 00:00:00 +0000</pubDate>
      <guid>https://www.fracturelabs.com/posts/secure-static-website-deployment/</guid>
      <description>You don&amp;rsquo;t have to give up dynamic website features to get the benefits of a static website. Learn how migrating to a website powered by serverless hosting can reduce the attack surface of your site, increase site performance, and reduce recurring charges.</description>
    </item>
    <item>
      <title>Preventing IP-based Drive-Bys in Apache</title>
      <link>https://www.fracturelabs.com/posts/preventing-ip-based-drive-bys-in-apache/</link>
      <pubDate>Tue, 10 Jan 2017 21:41:44 -0500</pubDate>
      <guid>https://www.fracturelabs.com/posts/preventing-ip-based-drive-bys-in-apache/</guid>
      <description>How many attacks is your webserver under from script kiddies and automated bots? If you&amp;rsquo;re allowing connections with IP addresses for host headers you&amp;rsquo;re servers are at greater risk than they need be. Learn how to filter out the noise and block requests that aren&amp;rsquo;t intended for your specific domain name.</description>
    </item>
    <item>
      <title>Security Camera Dynamic Analysis</title>
      <link>https://www.fracturelabs.com/posts/security-camera-dynamic-analysis/</link>
      <pubDate>Tue, 27 Dec 2016 12:53:35 -0500</pubDate>
      <guid>https://www.fracturelabs.com/posts/security-camera-dynamic-analysis/</guid>
      <description>The series on hacking IP cameras continues in this post, with the work moves on to the dynamic analysis phase.</description>
    </item>
    <item>
      <title>Security Camera Hacking</title>
      <link>https://www.fracturelabs.com/posts/security-camera-hacking/</link>
      <pubDate>Tue, 27 Dec 2016 11:53:35 -0500</pubDate>
      <guid>https://www.fracturelabs.com/posts/security-camera-hacking/</guid>
      <description>&lt;p&gt;This post was inspired by some work we did almost two years ago, but never got around to fully documenting or reporting the issues to the vendor since this was just independent research.  We wanted to have all of the attacks fully baked before reporting the issues, but then moved on to other projects.  So I&amp;rsquo;ve decided to go back and redo all of the work on this to properly document everything. I will be blurring out any identifying information until the vendor has had a chance to respond, so for now I&amp;rsquo;ll just refer to the vendor as &amp;lsquo;CompanyX&amp;rsquo;.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
