[DEFCON 20] Embedded device firmware vulnerability hunting using FRAK
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
https://youtu.be/k9nC8wYVhoU
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
https://youtu.be/k9nC8wYVhoU
YouTube
[DEFCON 20] Embedded device firmware vulnerability hunting using FRAK
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
Ang Cui - Red Balloon Security
We present FRAK, the firmware reverse analysis konsole. FRAK is a framework for unpacking, analyzing, modifying and repacking…
Ang Cui - Red Balloon Security
We present FRAK, the firmware reverse analysis konsole. FRAK is a framework for unpacking, analyzing, modifying and repacking…
36C3 - Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
https://youtu.be/nynW9LP0njY
https://youtu.be/nynW9LP0njY
YouTube
36C3 - Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale - deutsche Übersetzun
https://media.ccc.de/v/36c3-10891-identifying_multi-binary_vulnerabilities_in_embedded_firmware_at_scale
Low-power, single-purpose embedded devices (e.g., routers and IoT devices) have become ubiquitous. While they automate and simplify many aspects of…
Low-power, single-purpose embedded devices (e.g., routers and IoT devices) have become ubiquitous. While they automate and simplify many aspects of…
#Eko2020 Main Track | Static analysis-based recovery of service function calls in UEFI firmware
Reversing #UEFI firmware requires a lot of background and knowledge about #firmware and understanding of #hardware before you can start hunting for vulnerabilities. With our new tool, we automatically recover services calls and EFI type info, so that a firmware code looks like original
https://youtu.be/rK0tmVa19ME
Reversing #UEFI firmware requires a lot of background and knowledge about #firmware and understanding of #hardware before you can start hunting for vulnerabilities. With our new tool, we automatically recover services calls and EFI type info, so that a firmware code looks like original
https://youtu.be/rK0tmVa19ME
YouTube
#Eko2020 Main Track | Static analysis-based recovery of service function calls in UEFI firmware
Reversing #UEFI firmware requires a lot of background and knowledge about #firmware and understanding of #hardware before you can start hunting for vulnerabilities. With our new tool, we automatically recover services calls and EFI type info, so that a firmware…
Introduction to IoT Reversing Firmware
In this webinar, we talked about how to get started with IoT pentesting and hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
https://youtu.be/pHSDeCszNvU
In this webinar, we talked about how to get started with IoT pentesting and hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
https://youtu.be/pHSDeCszNvU
YouTube
Introduction to IoT Reversing Firmware | Payatu | Arun Magesh
#IoT #Firmware #infosec
In this webinar, we talked about how to get started with IoT pentesting and hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
***************************************
STAY TUNED:…
In this webinar, we talked about how to get started with IoT pentesting and hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
***************************************
STAY TUNED:…
Forwarded from Android Security & Malware
Malware found on the Huawei's AppGallery app store for the first time (10 apps were installed by 538,000 users)
https://news.drweb.com/show/?i=14182
https://news.drweb.com/show/?i=14182
Dr.Web
Malware found on the AppGallery app store for the first time
Doctor Web’s virus analysts have uncovered the first malware on AppGallery―the official app store from the Huawei Android device manufacturer. They turned out to be dangerous Android.Joker trojans that function primarily to subscribe users to premium mobile…
[Vulnerability] - Cookie Stored injection - XSS at Heroic Third Service, call cookies!
the application calls an external service to create the cookies and they are sent back to the server!
https://youtu.be/maatBdt8TPY
Youtube: @Phatansm_Lab
the application calls an external service to create the cookies and they are sent back to the server!
https://youtu.be/maatBdt8TPY
Youtube: @Phatansm_Lab
@Phantasm_Lab pinned «[Vulnerability] - Cookie Stored injection - XSS at Heroic Third Service, call cookies! the application calls an external service to create the cookies and they are sent back to the server! https://youtu.be/maatBdt8TPY Youtube: @Phatansm_Lab»
Forwarded from @Phantasm_Lab
The Mobile Application Hackers Handbook
🕴 @Phantasm_Lab
Mobile computing has changed the game. Your personal data is no longer just stored on your desktop in the sanctuary of your office or home. You now carry personally identifiable information, financial data, personal and corporate email, and much more in your pocket, wherever you go. The smartphone is quickly becoming ubiquitous, and with at least 40 applications installed on the average smartphone the attack surface is significant.The focus of this book is highly practical. Although we provide some background theory for you to understand the fundamentals of mobile application vulnerabilities, our primary concern is documenting the techniques you need to master to attack and exploit them. Where applicable, we include real-world examples derived from our many years of experience and from publically documented vulnerabilities.🕴 @Phantasm_Lab
Forwarded from @Phantasm_Lab ([L]uth1er)
THE HACKER PLAYBOOK.pdf
26.1 MB
Forwarded from @Phantasm_Lab
The Hacker Playbook 2 - Practical Guide To Penetration Testing
https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
| PDF/EPUB/MOBI | 23/18/53 MB |https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker PlayBook 3 - Pratical Guide To Penetration Testing
🕴🏽 @Phantasm_Lab
This is the third iteration of The Hacker Playbook (THP) series. Below is an overview of all the new vulnerabilities and attacks that will be discussed. In addition to the new content, some attacks and techniques from the prior books (which are still relevant today) are included to eliminate the need to refer back to the prior books. So, what's new? Some of the updated topics from the past couple of years include:- Abusing Active Directory- Abusing Kerberos- Advanced Web Attacks- Better Ways to Move Laterally- Cloud Vulnerabilities- Faster/Smarter Password Cracking- Living Off the Land- Lateral Movement Attacks- Multiple Custom Labs- Newer Web Language Vulnerabilities- Physical Attacks- Privilege Escalation- PowerShell Attacks- Ransomware Attacks- Red Team vs Penetration Testing- Setting Up Your Red Team Infrastructure- Usable Red Team Metrics- Writing Malware and Evading AV- And so much more🕴🏽 @Phantasm_Lab