Hardcoded AES 256 bit key used in Kankun Smart socket and its mobile App
Vulnerability: Hardcoded AES 256 bit key used in Kankun Smart socket and its mobile App. Vulnerability Description The kankun smart socket device and the mobile app use a hardcoded AES 256 bit key to...
View ArticleHijacking Kankun IoT Smart socket
Introduction: The Internet of Things (IoT) space is very interesting as it encompasses hardware, mobile and cloud/web. Its a very good mix of technologies to hack around where you can sharpen your...
View ArticleUninitialized Stack Variable – Windows Kernel Exploitation
Introduction We are going to discuss about use of Uninitialized Stack Variable vulnerability. This post will brief you about what is an uninitialized variable, what could be the adverse effect of...
View ArticleHardcoded AES 256 bit key used in Kankun Smart socket and its mobile App
Vulnerability: Hardcoded AES 256 bit key used in Kankun Smart socket and its mobile App. Vulnerability Description The kankun smart socket device and the mobile app use a hardcoded AES 256 bit key to...
View ArticleHijacking Kankun IoT Smart socket
Introduction: The Internet of Things (IoT) space is very interesting as it encompasses hardware, mobile and cloud/web. Its a very good mix of technologies to hack around where you can sharpen your...
View ArticleUninitialized Stack Variable – Windows Kernel Exploitation
Introduction We are going to discuss about use of Uninitialized Stack Variable vulnerability. This post will brief you about what is an uninitialized variable, what could be the adverse effect of...
View ArticleHow I Reverse Engineered and Exploited a Smart Massager
I have been working with Bluetooth for quite some time. I chose to reverse engineer a smart device to prove how crazy is the security standard being implemented in these smart devices. In this post, I...
View ArticleLLDB’s Runtime Manipulation: A Guide to Advance Debugging and Optimization
Authentication bypass is the process of removing the limitations imposed by Apple on iOS devices, allowing users to install and run apps that are not authorized by Apple. Authentication not only gives...
View Article