|
You are here |
keenlab.tencent.com | ||
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Linux Kernel stack overflow vulnerability. | |
| | | | |
insinuator.net
|
|
| | | | | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ... | |
| | | | |
blog.infosectcbr.com.au
|
|
| | | | | IntroductionIn October 2024, InfoSect participated in Pwn2Own - a bug bounty competition against embedded devices such as cameras, NAS', and smart speakers. In this blog, I'll discuss our exploit we developed to get remote code execution on the Synology TC500 smart camera using a format string vulnerability. In the end, we weren't able to use... | |
| | | | |
glama.ai
|
|
| | | Enables AI assistants to execute penetration testing commands and security tools on Kali Linux remotely. Supports automated reconnaissance, vulnerability scanning, and CTF solving through integration with 25+ offensive security tools like nmap, gobuster, and nuclei. | ||