|
You are here |
yifan.lu | ||
| | | | |
labs.withsecure.com
|
|
| | | | | Full disk encryption is one of the cornerstones of modern endpoint protection. It is not only an effective method to protect sensitive data against physical theft, but it also protects data integrity against tampering attacks. | |
| | | | |
sergioprado.blog
|
|
| | | | | JTAG is a physical hardware interface that makes it possible, among other things, to extract the firmware image from electronic devices. | |
| | | | |
www.copetti.org
|
|
| | | | | An in-depth analysis that explains how this console works internally | |
| | | | |
taeluralexis.com
|
|
| | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | ||