Internet of Thing

Firmware Simulation (hardware hacking series) – Part III

In previous blog we performed firmware analysis, which gave us an idea about device’s file system, OS, sensitive files, hardcoded credentials, services and softwares running, among other things. Next, what we need to do and will be doing is “firmware simulation” which can be browser based, allowing us to-do web app based exploitation or CLI …

Firmware Simulation (hardware hacking series) – Part III Read More »

Firmware Analysis (hardware hacking series) – Part II

As we move forward to our next blog in hardware hacking series, we will be focusing on firmware analysis. In our previous blog we have discussed the methodology for hardware hacking Let’s first discuss what exactly is firmware. It is software program permanently carved into a hardware device like keyboards, hard drives etc. It is …

Firmware Analysis (hardware hacking series) – Part II Read More »

WiFi jamming: a ‘DOS/Deauth attack’

WiFi jamming allows us to take rogue stations/clients off our network. Software does this using de-authentication attack where it will flood the target access-point(AP) with deauth packets. This will cause the target AP to disconnect the clients from the network. It doesn’t involve the actual jamming of radio frequencies, which can be done using tool …

WiFi jamming: a ‘DOS/Deauth attack’ Read More »

Your smart wearables are violating your privacy! Find out how?

Smart wearables like Fitbits and Smartwatches have become a trend in the society and this does seem to come to an end. Rather we expect to see more varieties of these smart wearables in the coming times. Smart wearables make our lives more integrated with technology, a Fitbit can track our workout levels, help in …

Your smart wearables are violating your privacy! Find out how? Read More »