This blogpost is a direct copy of previous research i have done at PenTestPartners. The original post resides here: https://www.pentestpartners.com/security-blog/burning-down-the-house-with-iot/ This blog post is purely for archive purposes only For years we’ve been trying to set fire to ‘smart’ things by hacking them. We
This blogpost is a direct copy of previous research i have done at PenTestPartners. The original post resides here: https://www.pentestpartners.com/security-blog/ewon-flexy-iot-router-a-deep-dive/ This blog post is purely for archive purposes only First off I would like to thank the techs at PTP for their insights and help
This blogpost is a direct copy of previous research i have done at PenTestPartners. The original post resides here: https://www.pentestpartners.com/security-blog/oracle-maf-store-bypass-a-how-to/ This blog post is purely for archive purposes only On a recent assignment I was asked to look at the security of a cloud-based solution
This blogpost is a direct copy of previous research i have done at SensePost. The original post resides here: https://sensepost.com/blog/2017/deep-insert-card-skimmer-research/ This blog post is purely for archive purposes only So I get a phone call from Daniel on a Wednesday night, Stu, can you bring
This blogpost is a direct copy of previous research i have done at SensePost. The original post resides here: https://sensepost.com/blog/2016/sensepost-maltego-toolkit-skyper/ This blog post is purely for archive purposes only Collecting and performing Open Source Intelligence (OSINT) campaigns from a wide array of public sources means