Chirag Jariwala

July 18, 2020

OWASP Top 10 Overview and Vulnerabilities

What is OWASP? OWASP, also known as the Open Web Application Security Project, is an online platform that creates articles available freely, programs, documentation, tools, and […]
April 21, 2020
Phishing_Attacks_COVID_19

How to Secure Yourself From Coronavirus Phishing Attacks in Times of COVID-19

Introduction The year 2020 just had just started and we got struck with global pandemic COVID-19 caused by the novel coronavirus. With this global fear, one […]
September 4, 2019

CAN Bus protocol Penetration testing and forensics

Introduction CAN (Controller Area Network) is a vehicle bus protocol standard which allows microcontrollers and ECU (electronic control units) to communicate which each other without a […]
August 12, 2019
EEPROM without desoldering

Reading data from EEPROM without desoldering

Introduction In IoT/Hardware security it is a common practice of dumping firmware/bootloader data in order to perform reverse engineering for closed source system applications. Well, the […]
Enable Notifications    Ok No thanks