Securing and Auditing Remote Process Automation Securing and Auditing Remote Process Automation 1. Securing RPA: RPA introduces a new attack surface that can be leveraged […]
Implementing Cybersecurity in Robotics Introduction: As technology and human intelligence are evolving, new products are being developed by humans. But the evolution comes with benefits […]
Introduction Recently while solving a challenge on Vulnhub.com, I came across a machine called “Jigsaw: 1” At the stage of privilege escalation, a buffer overflow […]
SSL Pinning: Introduction & Bypass for Android What is SSL Pinning ? SSL pinning allows the application to only trust the valid or pre-defined certificate […]
LLMNR/NBT-NS Poisoning In this blogpost, we’ll talk about poisoning name services (such as LLMNR, NBT-NS) within local networks. In a local area network, you can […]
Tokenization RBI Guidelines Tokenization RBI Guidelines RBI Releases Guidelines on Tokenization for Card Transactions Reserve Bank of India has issued a directive under Section 10 […]
Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however contained a plaintext password. This […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited to, phones, routers, IoT devices, […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help of GNU Debugger (GDB). In […]