Explore >> Select a destination


You are here

blog.fuzzing-project.org
| | insinuator.net
4.2 parsecs away

Travel
| | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ...
| | henrikwarne.com
5.3 parsecs away

Travel
| | I just finished taking the course Software Security from the University of Maryland via Coursera.It was a relatively easy course (at least if you know C) that gave an overview of the following areas: buffer overflows and other memory attacks, web security (including SQL injection, CSRF and XSS), secure design, static analysis, symbolic execution, fuzzing...
| | cookie.engineer
4.2 parsecs away

Travel
| | Linux Assembly Part 3: Control Flow
| | www.zerodayinitiative.com
19.9 parsecs away

Travel
| [AI summary] A critical remote code execution vulnerability in SolarWinds Access Rights Manager allows attackers to execute arbitrary code with service account privileges if proper data validation is not enforced.