Posts - Page 2
Showing 13-24 of 41 posts
IoT Reversing 101: Discovery
Before we delve into the world of reverse engineering, we need to discuss what engineering as a whole actually is. > Eng...

The Amazing World of File Fuzzing
The world of File Fuzzing is filled with a truly spectacular display of testing. It is the latest shift in software inje...

Modern Hash Cracking
When it comes to has-cracking, a hash-cracking program which works on an enormous database of hashes can guess many mill...

Neverwave: IDS/IPS like functionality in your browser with TLS inspection
During the last years IDS/IPS technology has helped to detect malicious activity not only in the server side but also in...

Pentesting iOS Apps with OSX and a Jailbroken device
Today we will explain how to perform a basic security assessment on an iOS Application using Mac. For this assessment it...

OT Security at h-c0n 2020
Over the last few years OT devices have been increasingly exposed to the internet, IoT devices have progressively approa...

Klara: Private retrohunting platform
Let's talk about malware hunting. Sometimes you may find an interesting malware sample, and after reversing it you reali...

attribution.id: Lurking threat actors and targets with VT
Lurking threat actors and targets with VT Tracking malware actors and targets is not an easy task, so if you have a Viru...

Dynamic win32 malware analysis on Linux
Sometimes we don't have a Windows machine for analyzing a malware sample. If the sample is very simple and is not intera...

UART access. Hardware Hacking with Bus Pirate
[Bus Pirate](https://www.amazon.es/gp/product/B011G6QQQI/ref=as_li_tl?ie=UTF8&camp=3638&creative=24630&creativeASIN=B011...

Real-time processing with Python
Sometimes we need to process tons of data, but scaling application is not easy, above all in python. That's why I starte...

RTL and BladeRF
In this guide you will learn how to install BladeRF with SDR or SDRSharp support on Windows 10 and Linux. The FPGA is lo...