Quantcast
Channel: Reversing Archives - Payatu
Browsing all 8 articles
Browse latest View live

Hardcoded AES 256 bit key used in Kankun Smart socket and its mobile App

Vulnerability: Hardcoded AES 256 bit key used in Kankun Smart socket and its mobile App. Vulnerability Description The kankun smart socket device and the mobile app use a hardcoded AES 256 bit key to...

View Article



Image may be NSFW.
Clik here to view.

Hijacking Kankun IoT Smart socket

Introduction: The Internet of Things (IoT) space is very interesting as it encompasses hardware, mobile and cloud/web. Its a very good mix of technologies to hack around where you can sharpen your...

View Article

Image may be NSFW.
Clik here to view.

Uninitialized Stack Variable – Windows Kernel Exploitation

Introduction We are going to discuss about use of Uninitialized Stack Variable vulnerability. This post will brief you about what is an uninitialized variable, what could be the adverse effect of...

View Article

Hardcoded AES 256 bit key used in Kankun Smart socket and its mobile App

Vulnerability: Hardcoded AES 256 bit key used in Kankun Smart socket and its mobile App. Vulnerability Description The kankun smart socket device and the mobile app use a hardcoded AES 256 bit key to...

View Article

Image may be NSFW.
Clik here to view.

Hijacking Kankun IoT Smart socket

Introduction: The Internet of Things (IoT) space is very interesting as it encompasses hardware, mobile and cloud/web. Its a very good mix of technologies to hack around where you can sharpen your...

View Article


Image may be NSFW.
Clik here to view.

Uninitialized Stack Variable – Windows Kernel Exploitation

Introduction We are going to discuss about use of Uninitialized Stack Variable vulnerability. This post will brief you about what is an uninitialized variable, what could be the adverse effect of...

View Article

Image may be NSFW.
Clik here to view.

How I Reverse Engineered and Exploited a Smart Massager

I have been working with Bluetooth for quite some time. I chose to reverse engineer a smart device to prove how crazy is the security standard being implemented in these smart devices. In this post, I...

View Article

Image may be NSFW.
Clik here to view.

LLDB’s Runtime Manipulation: A Guide to Advance Debugging and Optimization

Authentication bypass is the process of removing the limitations imposed by Apple on iOS devices, allowing users to install and run apps that are not authorized by Apple. Authentication not only gives...

View Article

Browsing all 8 articles
Browse latest View live




Latest Images