Explore >> Select a destination


You are here

www.anvilsecure.com
| | www.atredis.com
1.2 parsecs away

Travel
| | [AI summary] The blog post discusses the analysis of a TVM (Tiny Virtual Machine) implementation found in a smartwatch firmware, uncovering several critical vulnerabilities. The vulnerabilities include buffer overflows, use-after-free conditions, and potential for arbitrary memory read/write. The author outlines potential next steps for further exploitation and analysis, including dynamic fuzzing, QEMU emulation, and firmware patching. The post is authored by Dion Blazakis with peer review and editing by other team members.
| | blog.thalium.re
2.5 parsecs away

Travel
| | [AI summary] The blog post discusses the author's experience in vulnerability research and exploitation targeting Steam and its related products, including Steam Link and Remote Play. It covers various vulnerabilities such as format string vulnerabilities, request forgery, heap overflows, and a remote code execution (RCE) exploit. The author also details their interactions with HackerOne and Valve, highlighting the challenges in getting timely responses and the eventual resolution of the reported issues.
| | insinuator.net
3.5 parsecs away

Travel
| | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ...
| | greg.molnar.io
29.0 parsecs away

Travel
| In this tutorial, I will show you how to use MRSK to deploy a Rails app to a VPS, run Caddy in front of the docker container to handle SSL, use a hosted database server, run Redis on the same droplet, run a worker to process background jobs