Blog
Home / Blog

Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326
A critical privilege escalation vulnerability (CVE-2024-28326) has been identified in the Asus RT-N12+ B1 router. The device exposes an unrestricted root terminal via its UART

A Guide to Server-Side Template Injection (SSTI)
Web applications often use template engines to dynamically generate web pages by combining static templates with runtime data. While template engines make development faster and

Getting Started with Hardware Hacking
Ever been curious about hardware hacking but didn’t know where to begin? You’re not alone. At first glance, hardware hacking and reverse engineering can feel

Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module
Unlocking Firmware Customization with the CH341A Programmer and ESP-01 Module Firmware customization has become a core skill in hardware hacking and cybersecurity research. With the

EXPLIoT: A Framework For Exploiting And Securing IoT Devices
EXPLIoT: A Framework for Exploiting and Securing IoT Devices Smart devices have become part of our daily lives—helping us save time, automate tasks, and improve

Flying Secure- A Comprehensive Guide to the Nabhyaan Drone
Drones are no longer just hobby gadgets—they’ve become critical assets across industries like agriculture, surveillance, defense, and logistics. The Nabhyaan Drone, with its advanced design

Security Advisory – Multiple Vulnerabilities in LB-link BL-W1210M Router
Overview: Our security research has identified several critical vulnerabilities in the LB-Link BL-W1210M router. These flaws could enable attackers to bypass security protocols, gain unauthorized

Domain Trusts: An Exploitation Playbook
Domain Trusts: An Exploitation Playbook Understanding how domain trusts operate in Windows Active Directory has become a critical skill in modern cybersecurity. Trust relationships—meant to

Car Hacking- The New Frontier in Cybersecurity
As cars evolve into highly connected, computer-driven machines, they are also becoming new targets for cybercriminals. Modern vehicles now feature infotainment systems, autonomous driving capabilities,

Security Advisory – Multiple Vulnerabilities in Netgear WNR614 Router
Overview Our latest security assessment has identified several critical vulnerabilities in the Netgear WNR614 router, a device widely recognized for its reliable performance, stable connectivity,

Analyzing Firmware and Extracting Filesystem
Every modern device you interact with—from Wi-Fi routers to smart TVs, medical equipment to industrial controllers—relies on firmware, the invisible layer of code that brings

Cybersecurity Strategies For Small And Mid-Sized Businesses (SMBs)
Cybersecurity Strategies For Small And Mid-Sized Businesses (SMBs) Small and mid-sized businesses (SMBs) are increasingly turning to digital platforms to grow their brand presence, reach