Blog

Stay up to date with Payatu blog

Blog

Stay up to date with Payatu blog

Close the overlay

I am looking for
Please click one!

19/06/2020
munawwar

IoT Security - Part 7 (Reverse Engineering an IoT Firmware)

Introduction This blog is part of the “IoT Security” Series. If you haven’t read the previous blogs (parts 1 - 6) in the series, I urge you to go through them first unless you are already fa...

11/05/2020
munawwar

TrendNet Wireless Camera buffer overflow vulnerability

CVE Details ID : https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12763 https://payatu.com/advisory/trendnet-wireless-camera-buffer-overflow-vulneribility Description TrendNet ProVi...

16/04/2020
munawwar

A case of analysing encrypted firmware

Introduction Security analysis of the device firmware is a very crucial part of IoT Security Auditing. Obtaining firmware is amongst the many challenges of the analysis and there are tons of techn...

18/02/2020
asmita-jha

Hardware Attack - Stack Smashing And Protection

Stack exploitation based on buffer overflow has been one of the well-known security exploits. Refer https://payatu.com/blog/Siddharth-Bezalwar/understanding-stack-based-buffer-overflow for the basic u...

26/06/2017
Abhijith-Soman

Firmware Visual Analysis Part-1

Firmware analysis gives more understanding about the embedded device and what it contains. It helps to, Identify vulnerabilities in the embedded device firmware. Improve product stability and resistance to attacks. Do security auditing...