Magspoof – Wirelessly Spoof Magnetic Stripereaders
MagSpoof is a device that can spoof or emulate any magnetic stripe or credit card and it can work wirelessly even on standard magstri...
The Right Way to Publish a CVE
In research, Mar 17, 2021IoT Reversing 101: Discovery
In hw-hacking, iot-security, reversing, Mar 15, 2021The Amazing World of File Fuzzing
In research, Mar 14, 2021Dinoflux
Jose Ramon Palanco holds a Telecommunications Engineering degree from The University of Alcala de Henares in Madrid. Jose Ramon is th...
Read MoreAll Stories
Magspoof – Wirelessly Spoof Magnetic Stripereaders
MagSpoof is a device that can spoof or emulate any magnetic stripe or credit card and it can work wirelessly even on standard magstripe credit card readers by generating a strong elec...
In hw-hacking, iot-security, Mar 21, 2021The Right Way to Publish a CVE
A CVE is a dictionary of publicly known cybersecurity vulnerabilities which is intended to uniquely identify and name publicly disclosed vulnerabilities pretraining to specific versio...
In research, Mar 17, 2021IoT Reversing 101: Discovery
Before we delve into the world of reverse engineering, we need to discuss what engineering as a whole actually is.
In hw-hacking, iot-security, reversing, Mar 15, 2021The Amazing World of File Fuzzing
The world of File Fuzzing is filled with a truly spectacular display of testing. It is the latest shift in software injection and is worth anyone’s attention. But do you really know w...
In research, Mar 14, 2021The Ultimate Guide to JTAG
If you are interested in the hacking industry, chances are that you have come across JTAG.Chances are you have used it in the past to reflash some piece of hardware.But how exactly do...
In guides, Aug 09, 2020How to Design and Publish Electronic Boards – Everything You Need to Know
The Kitspace, formerly known as Kitnic, is a registry of open-source hardware electronic projects which are ready to order and build.This means that they could be described as thingiv...
In electronic board, Aug 09, 2020Firmware Reversing: FACT Core
Firmware analysis can be a tough challenge with a lot of tasks involved in its effective execution.Many of these tasks can be done automatically through new approaches or through the ...
In reverse engineering, Aug 09, 2020deDECTed – DECT Sniffing the Right Way
Before we begin this guide there is something important that needs to be discussed.Recording phone conversations without having consent from the user is highly illegal within the Unit...
In sniffing, Aug 09, 2020Modern Hash Cracking
When it comes to has-cracking, a hash-cracking program which works on an enormous database of hashes can guess many millions or billions of possible passwords automatically and compar...
In research, Aug 09, 2020