Blog

Stay up to date with Payatu blog

Blog

Stay up to date with Payatu blog

Close the overlay

I am looking for
Please click one!

19/06/2020

IoT Security - Part 7 (Reverse Engineering an IoT Firmware)



munawwar

Introduction This blog is part of the “IoT Security” Series. If you haven’t read the previous blogs (parts 1 - 6) in the series, I urge you to go through them first unless you are already fa

Read more
11/05/2020

TrendNet Wireless Camera buffer overflow vulnerability



munawwar

CVE Details ID : https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12763 https://payatu.com/advisory/trendnet-wireless-camera-buffer-overflow-vulneribility Description TrendNet ProVi

Read more
16/04/2020

A case of analysing encrypted firmware



munawwar

Introduction Security analysis of the device firmware is a very crucial part of IoT Security Auditing. Obtaining firmware is amongst the many challenges of the analysis and there are tons of techn

Read more
18/02/2020

Hardware Attack - Stack Smashing And Protection



asmita-jha

Stack exploitation based on buffer overflow has been one of the well-known security exploits. Refer https://payatu.com/blog/Siddharth-Bezalwar/understanding-stack-based-buffer-overflow for the basic u

Read more
26/06/2017

Firmware Visual Analysis Part-1



Abhijith-Soman

Firmware analysis gives more understanding about the embedded device and what it contains. It helps to, Identify vulnerabilities in the embedded device firmware. Improve product stability and resistance to attacks. Do security auditing

Read more