
Implementing and Auditing Cyber Security in Robotics (Part – 1)
Implementing Cybersecurity in Robotics Introduction: As technology and human intelligence are evolving, new products are being developed by humans. But […]
Implementing Cybersecurity in Robotics Introduction: As technology and human intelligence are evolving, new products are being developed by humans. But […]
Introduction Recently while solving a challenge on Vulnhub.com, I came across a machine called “Jigsaw: 1” At the stage of […]
SSL Pinning: Introduction & Bypass for Android What is SSL Pinning ? SSL pinning allows the application to only trust […]
LLMNR/NBT-NS Poisoning In this blogpost, we’ll talk about poisoning name services (such as LLMNR, NBT-NS) within local networks. In a […]
Tokenization RBI Guidelines Tokenization RBI Guidelines RBI Releases Guidelines on Tokenization for Card Transactions Reserve Bank of India has issued […]
Attack is the secret of defense; defense is the planning of an attack. – Sun Tzu, The Art of War […]
Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the […]