Kaitai Struct v0.5 is released
How to recover lost Python source code if it's still resident in-memory
The TP-Link HS110 Wi-Fi is a cloud-enabled power plug that can be turned on and off remotely via app and offers energy monitoring and scheduling capabilities. As part of ongoing research into Internet of Things security, we performed a security analysis by reverse engineering the device firmware and Android app, sniffing app-to-device and device-to-app communications and fuzzing the proprietary protocols being used.
TP-Link WiFi SmartPlug Client and Wireshark Dissector
https://github.com/softScheck/tplink-smartplug
Fork pour récupérer les données de consommation et les injecter dans Domoticz
https://github.com/ajay10000/TP-Link-HS110
Jolie vidéo de démo du trafic réseau à l'installation et l'utilisation TP Link HS110 Smart Plug Deep Dive
Wifi Hacking Tools Collection
https://w1f1.net/
A few months back I (finally) tried to get started into bug bounties. The bounty I chose for this first try consisted of a set of different security products. The vendor was offering for this purpose online web instances with testing accounts, but after some digging I realized that those...
via https://twitter.com/bearstech/status/782112364833411073
In a paper they released earlier this month titled “Stealing Machine Learning Models via Prediction APIs,” a team of computer scientists at Cornell Tech, the Swiss institute EPFL in Lausanne, and the University of North Carolina detail how they were able to reverse engineer machine learning-trained AIs based only on sending them queries and analyzing the responses.
Paper here: https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer
utilisation du débogueur gdb
Ce cours se présentera sous forme d’une série d’articles, oui vous avez bien entendu, Série. A l’heure ou j’écris cette introduction, au moins deux autres articles sont en phase de relecture, et encore deux sont en phase de draft.
Rombertik is a complex piece of malware with several layers of obfuscation and anti-analysis functionality that is ultimately designed to steal user data.
Hiding executables and DLLs in PNG files is yet another attempt to avoid detection and deliver malicious content to user systems. In this instance, the malicious content is placed at the end of the real PNG file data.