All Stories
Neverwave: IDS/IPS like functionality in your browser with TLS inspection
During the last years IDS/IPS technology has helped to detect malicious activity not only in the server side but also in the clients side. Actually, we experience an increasing volume...
In Projects, Jun 14, 2020Pentesting iOS Apps with OSX and a Jailbroken device
Today we will explain how to perform a basic security assessment on an iOS Application using Mac. For this assessment it is mandatory your IOS device is jailbroken. I assume you have ...
In hacking, reversing, Apr 05, 2020OT Security at h-c0n 2020
Over the last few years OT devices have been increasingly exposed to the internet, IoT devices have progressively approached the industry and this has caused us to face different chal...
In talks, hw-hacking, iot-security, Jan 31, 2020Klara: Private retrohunting platform
Let’s talk about malware hunting. Sometimes you may find an interesting malware sample, and after reversing it you realize that the binary has characteristics that make it unique like...
In intelligence, research, Apr 18, 2019attribution.id: Lurking threat actors and targets with VT
Lurking threat actors and targets with VT
In Projects, Mar 28, 2019Dynamic win32 malware analysis on Linux
Sometimes we don’t have a Windows machine for analyzing a malware sample. If the sample is very simple and is not interacting much with the operating system, we can use Linux.
In reversing, Feb 24, 2019UART access. Hardware Hacking with Bus Pirate
Bus Pirate is a flexible tool for hardware hacking that enables a universal bus interface that talks to most chips. It supports several protocols:
In hw-hacking, iot-security, Feb 17, 2019Real-time processing with Python
Sometimes we need to process tons of data, but scaling application is not easy, above all in python. That’s why I started researching about real-time data processing and I found out A...
In research, devop, Feb 08, 2019An Introduction To Hash Cracking
title: “An Introduction to Hash Cracking”date: “2020-8-9”image: assets/images/hashcracking.jpgauthor: namelayout: posttags: [ hash, cracking, coding]categories: [ hashcracking ]When i...
In Jan 30, 2019