IoT

Numair9747/Genzai: The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities

  Description Genzai helps you identify IoT or Internet of Things related dashboards across a single or set of targets provided as an input...

N[在野0day预警] CVE-2024-3400 Palo Alto Networks PAN-OS 命令执行

[在野0day预警] CVE-2024-3400 Palo Alto Networks PAN-OS 命令执行关于 Palo Alto Networks Palo Alto Networks 是一家全球领先的网络安全公司,总部位...

ARM固件基址自动识别

❝推测固件基址是 IoT 安全的经典问题。目前有基于字符串引用,跳转表等固件基址推测方法,但是当固件字符串较少或者被加密时,前者就会失效;当跳转表中不存...

D-Link NAS CVE-2024-3273 Exploit Tool

在 D-Link DNS-320L、DNS-325、DNS-327L 和 DNS-340L 中发现了一个漏洞,该漏洞被分类为严重,直至 20240403。受影响的是文件/的未知功能组件 HTTP GET 请求...

CVE-2024-3273: D-Link NAS Vulnerability Threatens 92,000 Devices

Security researchers have uncovered a serious vulnerability in several D-Link Network Attached Storage (NAS) devices, including DNS-320L, DNS-327L,...

常见的固件加解密方式与D-Link固件解密实战分析

一前言当我们需要进行固件分析时,首先要做的就是获取固件,而获取固件无外乎就是从官网获取固件、通过流量拦截获取固件、使用编程器从闪存中读取固件以及通...

Pwnable.kr 解题笔记

本文编写的目的并不是单纯的给出题解,网上已经有数不清的题解了,本文想尽可能详细地根据本人的分析来解释一下每道题目背后蕴含的知识点,作为小白学习的资...

栈溢出漏洞利用之ret2txt&ret2shellcode

点击蓝字 关注我们栈利用漏洞溢出之ret2txt&ret2shellcode栈溢出介绍栈溢出指的是程序向栈中某个变量中写入的字节数超过了这个变量本身所申请的字节数,...

DJI Mavic 3 Drone Research Part 2: Vulnerability Analysis

While the general public might picture drones being used as toys or tools used by film producers, advances in affordable geospatial, data collectio...

DJI Mavic 3 Drone Research Part 1: Firmware Analysis

Nozomi Networks Labs recently conducted research on the security of a DJI Mavic 3 Series drone, with a special focus on the WiFi-based protocol cal...
1 2 3 4 79