Objection in Action Once all things go right, we can inject Frida scripts into our target application. Open target application and enter following command in powershell […]
Hello everybody, This article will cover dynamic run-time penetration testing of iOS applications or iOS pentesting, making use of the Objection framework or systems. An iOS […]
Internet of things (IoT) is the network of devices connected over the internet which enables them to communicate with each other and exchange data over the […]
Introduction CAN (Controller Area Network) is a vehicle bus protocol standard which allows microcontrollers and ECU (electronic control units) to communicate which each other without a […]
Introduction In IoT/Hardware security it is a common practice of dumping firmware/bootloader data in order to perform reverse engineering for closed source system applications. Well, the […]
IoT device Firmware Reverse Engineering: It is a process to understand the device architecture, functionality and vulnerabilities present in the device incorporating different methods. Firmware: Piece […]
Executive Summary Our security engineers found vulnerabilities in the FB50 smart lock mobile application. An information disclosure vulnerability chained together with poor token management led to […]