Stay up to date with Payatu blog
IoT Security – Part 7 (Reverse Engineering an IoT Firmware)
Firmware Reverse Engineering: Introduction This blog is part of the “IoT Security” Series. If you haven’t read the previous blogs (parts 1 - 6) in the series, I urge you to go through them f...
TrendNet Wireless Camera buffer overflow vulnerability
CVE Details ID : https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12763 https://payatu.com/advisory/trendnet-wireless-camera-buffer-overflow-vulneribility Description TrendNet ProVi...
A case of analysing encrypted firmware
Introduction : Encrypted Firmware Security analysis of the device firmware is a very crucial part of IoT Security Auditing. Obtaining firmware is amongst the many challenges of the analysis and th...
Hardware Attack - Stack Smashing And Protection
Stack exploitation based on buffer overflow has been one of the well-known security exploits. Refer https://payatu.com/blog/Siddharth-Bezalwar/understanding-stack-based-buffer-overflow for the basic u...
Firmware Visual Analysis Part-1
Firmware analysis gives more understanding about the embedded device and what it contains. It helps to, Identify vulnerabilities in the embedded device firmware. Improve product stability and resistance to attacks. Do security auditing...