Tech Blog

Breaking HTTPS in the IoT: Practical Attacks For Reverse Engineers
Stop Treating Breaches Like Natural Disasters: A New Mindset for Application Security
How to Set Up Your Hardware Lab
RMIScout: Safely and Quickly Brute-Force Java RMI Interfaces for Code Execution
The TL;DR on TF-IDF: Applied Machine Learning
GadgetProbe: Exploiting Deserialization to Brute-Force the Remote Classpath
How to Set Up Zniffer for Z-Wave
Dufflebag: Uncovering Secrets in Exposed EBS Volumes
Well, That Escalated Quickly
Escalator to the Cloud: 5 Privesc Attack Vectors in AWS