IoT

BlueSpy – Spying on Bluetooth conversations

BlueSpy is a proof of concept for exploiting vulnerabilities in Bluetooth headsets and eavesdropping on private conversations BlueSpy是利用蓝牙耳机...

PrintListener: remote fingerprint theft

Researchers from the U.S. and China recently published a paper proposing a mindboggling new method of fingerprint theft… 来自美国和中国的研究人员最...

Unsaflok flaw can let hackers unlock millions of hotel doors

Researchers disclosed vulnerabilities today that impact 3 million Saflok electronic RFID locks deployed in 13,000 hotels and homes worldwide, allow...

Route to Safety: Navigating Router Pitfalls

Introduction 介绍 Wi-Fi routers have always been an attractive target for attackers. When taken over, an attacker may gain access to a victim’s int...

TP-Link TDDP Buffer Overflow Vulnerability

Reverse engineering has always held an aura of mystery making it an intimidating field to venture into. The act of uncovering hidden vulnerabilitie...

Security Advisory: Remote Command Execution in Cisco Access Point WAP Products

Introduction 介绍 With the recent release of our binary zero-day identification feature, we wanted to demonstrate what it would look like, when app...

Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762

Disclaimer 免責聲明 The exploit described in this post is tailored to the exact version of FortiGate SSL VPN used for testing. It is unlikely the e...

Ruijie Switch PSG-5124 26293 – Remote Code Execution (RCE)

#- Exploit Title: Ruijie Switch PSG-5124 26293 - Remote Code Execution (RCE) #- Shodan Dork: http.html_hash:-1402735717 #- Fofa Dork: body='img/fre...

Serial PitM

Sometimes you need to get in the way of a hardware device and its controller, and see what it has to say for itself. If you are lucky, the two part...

【漏洞分析】CVE-2021-4145 dirty cred漏洞复现

作者论坛账号:xia0ji233复现一下 dirty cred 漏洞<!--more-->同样本篇文章采用的还是 环境配置——漏洞验证——源码分析——代码调试 这四部分。环境配置内...
1 4 5 6 7 8 81