IoT Security

December 26, 2019
Mobile device penetration Testing

Mobile device penetration Testing

In this blog, we are going to discuss the exploit scenarios to perform penetration testing for android mobile devices. Here we have categorized the penetrating testing […]
September 4, 2019
IoT Security Challenges

What are IoT Security Challenges?

Internet of things (IoT) is the network of devices connected over the internet which enables them to communicate with each other and exchange data over the […]
September 4, 2019
CAN Bus protocol Penetration testing

CAN Bus protocol Penetration testing and forensics

Introduction CAN (Controller Area Network) is a vehicle bus protocol standard which allows microcontrollers and ECU (electronic control units) to communicate which each other without a […]
August 12, 2019
EEPROM without desoldering

Reading data from EEPROM without desoldering

Introduction In IoT/Hardware security it is a common practice of dumping firmware/bootloader data in order to perform reverse engineering for closed source system applications. Well, the […]
August 7, 2019
IoT Device Penetration Testing

Learn about IoT Device Penetration Testing

A year ago, when I was fresher in the term of IoT security, I was very curious about the approaches for penetration testing on smart devices.  […]
August 5, 2019
IoT device Firmware Reverse Engineering

How to Start IoT device Firmware Reverse Engineering?

IoT device Firmware Reverse Engineering:  It is a process to understand the device architecture, functionality and vulnerabilities present in the device incorporating different methods. Firmware: Piece […]
August 2, 2019
FB50 Smart Lock Vulnerability Disclosure

FB50 Smart Lock Vulnerability Disclosure (CVE-2019-13143)

Executive Summary Our security engineers found vulnerabilities in the FB50 smart lock mobile application. An information disclosure vulnerability chained together with poor token management lead to […]
June 27, 2019
ARM Architecture

Arm Exploitation Series #1 — Introduction to the ARM Architecture

With the increasing growth in Internet-Of-Things (IoT) devices, it is an absolute necessity to scrutinize the security of these devices too, especially when they’re going to […]
Enable Notifications.    Ok No thanks