Craig S. Blackie (@craigsblackie) 's Twitter Profile
Craig S. Blackie

@craigsblackie

Hacker, network admin, ale drinking geek and lover.

ID: 66860762

calendar_today19-08-2009 00:57:20

3,3K Tweet

310 Followers

475 Following

Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

Many trust physical access control systems (PACS) to secure their spaces, but did you know access cards can often be easily cloned? In our latest blog, "How easily access cards can be cloned and why your PACS might be vulnerable," 00Waz reveals how attackers exploit outdated

Many trust physical access control systems (PACS) to secure their spaces, but did you know access cards can often be easily cloned?

In our latest blog, "How easily access cards can be cloned and why your PACS might be vulnerable," <a href="/00Waz/">00Waz</a> reveals how attackers exploit outdated
Iceman (@herrmann1001) 's Twitter Profile Photo

Look at this little piece of marvel. The next gen DESFire? CC EAL6 + My prediction that any rfid based hacks based on a modern product like this will not have a card only attack. Its only whole eco system that will need to be attack. #rfid #duox #mifare #nxp

Look at this little piece of marvel.

The next gen DESFire?  

CC EAL6 + 

My prediction that any rfid based hacks based on a modern product like this will not have a card only attack.  Its only whole eco system that will need to be attack. 

#rfid #duox #mifare #nxp
Iceman (@herrmann1001) 's Twitter Profile Photo

Just hit 6,000 subscribers on my YouTube channel. Thank you for following along with my projects and experiments. Your support means a lot and keeps me motivated to keep sharing. Cheers to all of you! šŸ™šŸ˜Š #TechProjects #YouTubeMilestone youtube.com/@iceman1001

Iceman (@herrmann1001) 's Twitter Profile Photo

Awesome meeting you at Bsides London and thank you so much for your modified door sim. I was showcasing it for a non-hacker yesterday :) Love it! and I will make video about it and I hope you will be in it talking about the modifications

Ulf Frisk (@ulffrisk) 's Twitter Profile Photo

PCILeech PCIe DMA attacks and MemProcFS memory forensics now runs on macOS analyzing Windows memory! MemProcFS 5.14 and PCILeech 4.19 just released! github.com/ufrisk/MemProc… github.com/ufrisk/pcileech

PCILeech PCIe DMA attacks and MemProcFS memory forensics now runs on macOS analyzing Windows memory!

MemProcFS 5.14 and PCILeech 4.19 just released!
github.com/ufrisk/MemProc…
github.com/ufrisk/pcileech
Iain Smart (@smarticu5) 's Twitter Profile Photo

Digging into how the latest Windows Kubernetes vuln works was a fun way to spend a couple of hours. We've just published some of my notes here: blog.amberwolf.com/blog/2025/janu…

Iceman (@herrmann1001) 's Twitter Profile Photo

Excited to share that our talk ā€˜Dismantling the SEOS Protocol’ will be part of Black Hat Asia 2025 briefings Black Hat Where we will present the reversing and implementing the SEOS protocol into the Proxmark3 tool. It's a great story! evildaemond and I are looking

Iceman (@herrmann1001) 's Twitter Profile Photo

Just uploaded a video about the Paxton Door Simulator! šŸ› ļø Walked through how to set it up with a Paxton wall reader and its practical uses in testing access control systems. šŸ”‘ Watch here: youtu.be/eWBViW3M9y8 And do me favor and subscribe! #AccessControl #RFID #paxton

Iceman (@herrmann1001) 's Twitter Profile Photo

In the upcoming video I take a look at Daniels FW for the Paxton door sim. Blistering fast C impl, nice features, Will it be suitable for weaponized readers?

In the upcoming video I take a look at Daniels FW for the Paxton door sim. 

Blistering fast C impl,   nice features,    

Will it be suitable for weaponized readers?
DanielRaines.com (@danielraines) 's Twitter Profile Photo

Read, decode, log, replay and enable cloning of Paxton Net2, Switch2, and Knockout fobs/cards. youtube.com/watch?v=AjH9_6…

DanielRaines.com (@danielraines) 's Twitter Profile Photo

#Proxmark3 RDv4.01 all setup and working with Iceman - next stop Troopers! Iceman firmware. Working in conjunction with my Paxtogeddon Reader for card/fob reading and logging, we use this device to clone the exported data. Works like an absolute charm. šŸ˜ #CardCloning #RFIDHacking

#Proxmark3 RDv4.01 all setup and working with <a href="/herrmann1001/">Iceman - next stop Troopers!</a> Iceman firmware. 

Working in conjunction with my Paxtogeddon Reader for card/fob reading and logging, we use this device to clone the exported data.

Works like an absolute charm. šŸ˜

#CardCloning #RFIDHacking
Luke Rogerson (@nullmode_) 's Twitter Profile Photo

I’m putting together a hands-on hacking session for college students in the South East of the UK. If you’re a student, teacher, or know of any colleges that might be interested, please let me know or share this with them! šŸ™

DanielRaines.com (@danielraines) 's Twitter Profile Photo

Updated firmware on ESP32 for click to clone as opposed to replay and wrote some software that runs on the LattePanda to accept serial data, encode hitag and write data via proxmark. #Software #Firmware #Hardware #CardCloning #SecurirtyResearch #RFIDHacking #Proxmark #LattePanda

Updated firmware on ESP32 for click to clone as opposed to replay and wrote some software that runs on the LattePanda to accept serial data, encode hitag and write data via proxmark.

#Software #Firmware #Hardware #CardCloning #SecurirtyResearch #RFIDHacking #Proxmark #LattePanda
Iceman (@herrmann1001) 's Twitter Profile Photo

It’s been a long journey—far from easy. But alongside some of the world’s finest researchers, I’ve been lucky to learn, break, and build. Huge thanks to bugcrowd for making it possible to see my bugmoji on the NASDAQ billboard in Times Square. The message says it best:

It’s been a long journey—far from easy.  But alongside some of the world’s finest researchers, I’ve been lucky  to learn, break, and build.

Huge  thanks to <a href="/Bugcrowd/">bugcrowd</a> for making it possible to see my bugmoji on the  NASDAQ billboard in Times Square. The message says it best:
Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

Microsoft Copilot for SharePoint just made recon a whole lot easier. 🚨   One of our Red Teamers came across a massive SharePoint, too much to explore manually. So, with some careful prompting, they asked Copilot to do the heavy lifting...   It opened the door to credentials,

Microsoft Copilot for SharePoint just made recon a whole lot easier. 🚨
Ā 
One of our Red Teamers came across a massive SharePoint, too much to explore manually. So, with some careful prompting, they asked Copilot to do the heavy lifting...
Ā 
It opened the door to credentials,