I’m writing this article on my path of becoming a better researcher on IoT devices. My goal was to create a portable device that I […]
Using UART to connect to a chinese IP cam
This blog post has been created for completing the requirements of the SecurityTube Offensive Internet of Things course. http://www.securitytube-training.com/online-courses/offensive-internet-of-things-exploitation/index.html Student ID: IoTE- 766 Following my […]
My notes on Hacking BLE – list of resources
In the last few weeks I went for a drive into the Bluetooth Low Energy (aka BLE) topic. There are many articles on the web […]
Reflected File Download Cheat Sheet
This article is focused on providing infosec people how to test and exploit a Reflected File Download vulnerability – discovered by Oren Hafif of Trustwave. […]