Peloton Bike+ vulnerability allowed complete takeover of devices
https://www.bleepingcomputer.com/news/security/peloton-bike-plus-vulnerability-allowed-complete-takeover-of-devices/
#Hardware
@iotpenetrationtesting
https://www.bleepingcomputer.com/news/security/peloton-bike-plus-vulnerability-allowed-complete-takeover-of-devices/
#Hardware
@iotpenetrationtesting
Top 5 Internet of Things (IoT) Hacking Tools
https://blog.eccouncil.org/top-5-internet-of-things-iot-hacking-tools/
#iot
#tools
@iotpenetrationtesting
https://blog.eccouncil.org/top-5-internet-of-things-iot-hacking-tools/
#iot
#tools
@iotpenetrationtesting
https://www.udemy.com/course/the-internet-of-things-iot-2020-trends-and-the-future/?couponCode=10D2F2107D53BE82FF02
#iot
@iotpenetrationtesting
#iot
@iotpenetrationtesting
Udemy
Online Courses - Learn Anything, On Your Schedule | Udemy
Udemy is an online learning and teaching marketplace with over 213,000 courses and 62 million students. Learn programming, marketing, data science and more.
exploit
CVE-2020-11235:
Buffer overflow might occur while parsing unified command due to lack of check of input data received in Snapdragon Auto / Compute / Connectivity / Consumer Electronics Connectivity /IOT / Industrial IOT / Mobile
https://github.com/PwnCast/CVE-2020-11235
CVE-2020-11238:
Possible Buffer over-read in ARP/NS parsing due to lack of check of packet length received in Snapdragon Auto / Compute / Connectivity / Consumer Electronics Connectivity /IOT / Industrial IOT / Mobile
https://github.com/PwnCast/CVE-2020-11238
#IoT
#CisoasaService
@iotpenetrationtesting
CVE-2020-11235:
Buffer overflow might occur while parsing unified command due to lack of check of input data received in Snapdragon Auto / Compute / Connectivity / Consumer Electronics Connectivity /IOT / Industrial IOT / Mobile
https://github.com/PwnCast/CVE-2020-11235
CVE-2020-11238:
Possible Buffer over-read in ARP/NS parsing due to lack of check of packet length received in Snapdragon Auto / Compute / Connectivity / Consumer Electronics Connectivity /IOT / Industrial IOT / Mobile
https://github.com/PwnCast/CVE-2020-11238
#IoT
#CisoasaService
@iotpenetrationtesting
Deploying_Secure_VVOIP_Systems.pdf
819.5 KB
"Deploying Secure Unified Communications/Voice and Video over IP Systems, ver.1.0", 2021.
#Blue_Team_Techniques
@iotpenetrationtesting
#Blue_Team_Techniques
@iotpenetrationtesting
IoT Security - Part 21 (Famous IoT Attacks & Vulnerabilities)
https://payatu.com/blog/asmita-jha/iot-attacks-and-vulnerabilities
#iot
#Attacks
#vulnerability
@iotpenetrationtesting
https://payatu.com/blog/asmita-jha/iot-attacks-and-vulnerabilities
#iot
#Attacks
#vulnerability
@iotpenetrationtesting
achieving_ot_network_visibility.pdf
4.2 MB
"Achieving OT Network Visibility and Detective Controls in a NERC CIP World", 2021.
#Whitepaper
#SCADA_Security
@iotpenetrationtesting
#Whitepaper
#SCADA_Security
@iotpenetrationtesting
BlueZ: Linux Bluetooth Stack Overview
https://naehrdine.blogspot.com/2021/03/bluez-linux-bluetooth-stack-overview.html
#Bluetooth
@iotpenetrationtesting
https://naehrdine.blogspot.com/2021/03/bluez-linux-bluetooth-stack-overview.html
#Bluetooth
@iotpenetrationtesting
List of awesome reverse engineering resources
https://github.com/wtsxDev/reverse-engineering
#ReversEngineering
@iotpenetrationtesting
https://github.com/wtsxDev/reverse-engineering
#ReversEngineering
@iotpenetrationtesting
Hacking IoT devices with Focaccia-Board
https://lucabongiorni.medium.com/hacking-iot-devices-with-focaccia-board-8c4e009ed488
#IoT
#Hack
@Iotpenetrationtesting
https://lucabongiorni.medium.com/hacking-iot-devices-with-focaccia-board-8c4e009ed488
#IoT
#Hack
@Iotpenetrationtesting
Pentesting Cheatsheets
Convenient commands for your pentesting/red-teaming engagements, OSCP and CTFs
https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets
@iotpenetrationtesting
Convenient commands for your pentesting/red-teaming engagements, OSCP and CTFs
https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets
@iotpenetrationtesting
www.ired.team
Pentesting Cheatsheets | Red Team Notes
Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.
#Malware_analysis
1. Analysis for the REvil Ransomware payload found in the Kaseya incident
https://chuongdong.com/reverse%20engineering/2021/07/11/REvilRansomware
2. BIOPASS RAT:
New Malware Sniffs Victims via Live Streaming
https://www.trendmicro.com/en_us/research/21/g/biopass-rat-new-malware-sniffs-victims-via-live-streaming.html
// Hackers Spread BIOPASS Malware via Chinese Online Gambling
@iotpenetrationtesting
1. Analysis for the REvil Ransomware payload found in the Kaseya incident
https://chuongdong.com/reverse%20engineering/2021/07/11/REvilRansomware
2. BIOPASS RAT:
New Malware Sniffs Victims via Live Streaming
https://www.trendmicro.com/en_us/research/21/g/biopass-rat-new-malware-sniffs-victims-via-live-streaming.html
// Hackers Spread BIOPASS Malware via Chinese Online Gambling
@iotpenetrationtesting
AllsafeCyberSecurity /awesome-ghidra
https://github.com/AllsafeCyberSecurity/awesome-ghidra
@iotpenetrationtesting
https://github.com/AllsafeCyberSecurity/awesome-ghidra
@iotpenetrationtesting
https://www.youtube.com/watch?v=ON6wqf6aFkw&ab_channel=IEEECouncilonElectronicDesignAutomation
@iotpenetrationtesting
@iotpenetrationtesting
YouTube
CAD for Assurance: Panel 2 Side-channel leakage - Can CAD come to the rescue?
The CAD for Trust and Assurance website is an academic dissemination effort by researchers in the field of hardware security. The goal is to assemble information on all CAD for trust/assurance activities in academia and industry in one place and share them…