Magspoof – Wirelessly Spoof Magnetic Stripereaders

MagSpoof is a device that can spoof or emulate any magnetic stripe or credit card and it can work wirelessly even on standard magstri...

In hw-hacking, iot-security, Mar 21, 2021

Dinoflux

Jose Ramon Palanco holds a Telecommunications Engineering degree from The University of Alcala de Henares in Madrid. Jose Ramon is th...

Read More

Instagram

All Stories

Magspoof – Wirelessly Spoof Magnetic Stripereaders

MagSpoof is a device that can spoof or emulate any magnetic stripe or credit card and it can work wirelessly even on standard magstripe credit card readers by generating a strong elec...

In hw-hacking, iot-security, Mar 21, 2021

The Right Way to Publish a CVE

A CVE is a dictionary of publicly known cybersecurity vulnerabilities which is intended to uniquely identify and name publicly disclosed vulnerabilities pretraining to specific versio...

In research, Mar 17, 2021

IoT Reversing 101: Discovery

Before we delve into the world of reverse engineering, we need to discuss what engineering as a whole actually is.

In hw-hacking, iot-security, reversing, Mar 15, 2021

The Amazing World of File Fuzzing

The world of File Fuzzing is filled with a truly spectacular display of testing. It is the latest shift in software injection and is worth anyone’s attention. But do you really know w...

In research, Mar 14, 2021

Modern Hash Cracking

When it comes to has-cracking, a hash-cracking program which works on an enormous database of hashes can guess many millions or billions of possible passwords automatically and compar...

In research, Aug 09, 2020

Neverwave: IDS/IPS like functionality in your browser with TLS inspection

During the last years IDS/IPS technology has helped to detect malicious activity not only in the server side but also in the clients side. Actually, we experience an increasing volume...

In Projects, Jun 14, 2020

Pentesting iOS Apps with OSX and a Jailbroken device

Today we will explain how to perform a basic security assessment on an iOS Application using Mac. For this assessment it is mandatory your IOS device is jailbroken. I assume you have ...

In hacking, reversing, Apr 05, 2020

OT Security at h-c0n 2020

Over the last few years OT devices have been increasingly exposed to the internet, IoT devices have progressively approached the industry and this has caused us to face different chal...

In talks, hw-hacking, iot-security, Jan 31, 2020

Drainware

Between 2011 and 2014 we developed a Cloud Platform with DLP capabilities, now in 2020 it is Open Source. It was a very cool technology at that time, we used mongo, redis, rabbitmq, ...

In Projects, Jan 22, 2020

Klara: Private retrohunting platform

Let’s talk about malware hunting. Sometimes you may find an interesting malware sample, and after reversing it you realize that the binary has characteristics that make it unique like...

In intelligence, research, Apr 18, 2019