Blog
Home / Blog

Task Hijacking StrandHogg (Pt. 2)
Hello, and welcome back! Hopefully you’ve already gone through Task Hijacking (StrandHogg) Vulnerability Part 1, learning how to identify StrandHogg vulnerabilities. If this is your

Task Hijacking (StrandHogg), Part1
StrandHogg is an Android vulnerability in which malicious applications exploit its multitasking system to display falsified applications like legitimate ones on devices running Android OS.

ChatGPT for Pen Testing (Pt. 2)
In our previous blog, we discussed how ChatGPT could be vital in providing vital assistance during penetration testing. This groundbreaking AI technology can offer essential

Security Advisory: Multiple Vulnerabilities in Syrotech Router
Overview: Our security analysis has uncovered multiple vulnerabilities in the Syrotech SY-GPON-1110-WDONT Router. The identified vulnerabilities present risks of security protocol circumvention and unauthorized retrieval

Cyber Security Training
In today’s rapidly evolving digital landscape, cybersecurity has become more important than ever. As cyber threats increase, organizations are prioritizing protecting their digital assets more

Introduction to Assembly Language
Assembly language programming is an intriguing field where programmers interact directly with the computer’s hardware. In this introductory guide to assembly language programming, we will

Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326
Privilege escalation attacks are particularly dangerous as they allow attackers to bypass restrictions and security measures put in place to safeguard the system. In a

A Guide to Server-Side Template Injection (SSTI)
Server-side template Injection (SSTI) occurs when an attacker injects a malicious payload into a template using native template syntax and causes it to execute on

Getting Started with Hardware Hacking
Ever wanted to work on hardware hacking but didn’t know where to start? You’re not alone. Hardware hacking and reverse engineering may seem intimidating at

Using the Ch341A Programmer and ESP-01 Module to jazz up firmware!
Firmware customization is a crucial aspect of hardware hacking and cybersecurity exploration. With the right tools and techniques, you can unlock the full potential of

EXPLIoT: Framework for exploiting IoT products
Smart devices have quickly become a mainstay of our homes, offering convenience and efficiency. They’re akin to new friends, capable of performing remarkable tasks. However,

Flying Secure- A Comprehensive Guide to the Nabhyaan Drone
Drones are rapidly becoming indispensable tools across various industries, from agriculture to security. However, with their growing use, the potential for security threats also increases.