ChatGPT for Pen Testing (Pt. 2)
ChatGPT for Pen Testing (Pt. 2) August 09, 2024 AI Gaurav Choudhari In our previous blog, we discussed how ChatGPT could be vital in providing vital assistance during penetration testing. This groundbreaking AI technology can offer essential insights on how to perform penetration testing effectively, assist with various tools, and simplify code analysis. In this […]
Security Advisory: Multiple Vulnerabilities in Syrotech Router
Security Advisory: Multiple Vulnerabilities in Syrotech Router August 01, 2024 Hardware Shravan Singh Overview: Our security analysis has uncovered multiple vulnerabilities in the Syrotech SY-GPON-1110-WDONT Router. The identified vulnerabilities present risks of security protocol circumvention and unauthorized retrieval of sensitive data by local entities. Affected Version The router variant impacted is the Syrotech SY-GPON-1110-WDONT, with […]
Cyber Security Training
Cyber Security Training April 25, 2024 Informational Shashi Prasad In today’s rapidly evolving digital landscape, cybersecurity has become more important than ever. As cyber threats increase, organizations are prioritizing protecting their digital assets more and more – this trend has driven up demand for skilled cybersecurity professionals exponentially. In this blog post, we’ll explore the […]
Introduction to Assembly Language
Introduction to Assembly Language May 3, 2024 Hardware Hacking Shravan Singh Assembly language programming is an intriguing field where programmers interact directly with the computer’s hardware. In this introductory guide to assembly language programming, we will cover its basics and simplify its syntax to equip you with the skills to write effective low-level code. Whether […]
Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326
Asus RT N12 + B1’s Privilege Escalation CVE-2024-28326 May 09, 2024 Hardware Shravan Singh Privilege escalation attacks are particularly dangerous as they allow attackers to bypass restrictions and security measures put in place to safeguard the system. In a recent assessment, the Asus RT-N12 + B1 routers exhibit a severe vulnerability. They give unrestricted root […]
A Guide to Server-Side Template Injection (SSTI)
A Guide to Server-Side Template Injection (SSTI) January 01, 2023 Web Application Server-side template Injection (SSTI) occurs when an attacker injects a malicious payload into a template using native template syntax and causes it to execute on the server. Template engines generate web pages by combining static templates with transient data. Server-side template injection attacks […]
Getting started with hardware hacking- essential tools
Getting started with hardware hacking- essential tools June 15, 2024 Hardware Shravan Singh Ever wanted to work on hardware hacking but didn’t know where to start? You’re not alone. Hardware hacking and reverse engineering may seem intimidating at first, but with the right tools and guidance, you can unlock electronic devices’ secrets, modify hardware to […]
Using the Ch341A Programmer and ESP-01 Module to jazz up firmware!
Using the Ch341A Programmer and ESP-01 Module to jazz up firmware! June 15, 2024 Hardware Shravan Singh Firmware customization is a crucial aspect of hardware hacking and cybersecurity exploration. With the right tools and techniques, you can unlock the full potential of embedded systems and push the boundaries of innovation. In this tutorial, we’ll walk […]
EXPLIoT: Framework for exploiting IoT products
EXPLIoT: Framework for exploiting IoT products June 14, 2024 Hardware Hacking Shravan Singh Smart devices have quickly become a mainstay of our homes, offering convenience and efficiency. They’re akin to new friends, capable of performing remarkable tasks. However, as with meeting new people, it’s essential to exercise caution and ensure their safety. This guide offers […]
Flying Secure- A Comprehensive Guide to the Nabhyaan Drone
Flying Secure- A Comprehensive Guide to the Nabhyaan Drone June 14, 2024 Hardware Shravan Singh Drones are rapidly becoming indispensable tools across various industries, from agriculture to security. However, with their growing use, the potential for security threats also increases. This guide provides a detailed, step-by-step approach to securing the Nabhyaan drone, covering its hardware […]