security
-
KeePass Integration with AutoHotKey {In Progress}
Tags: security taskautomation
-
Next Generation SDN - P4Runtime Basics
Tags: computernetwork securityThis post brings more details about the execution of P4Runtime Basics Tutorial that is part of the Next Generation SDN Tutorial. This post will cover the following topics: Look at the P4 starter code Compile it for the BMv2 software switch and understand the output (P4Info and BMv2 JSON fil... Read More
-
Buffer Overflow Through Vulnerable Program (Unix OS)
Tags: reverseengineering securityThe following program is an example of insecure implementation that enable the user to inject shell commands during its execution. It uses the system() function that executes commands into the host environment through the command processor and it returns after the command has been completed. Sys... Read More
-
Stack Overflow Explained
Tags: reverseengineering security
-
Investigating Car Key (RF Remote Control) With HackRF One - Part 1
Tags: reverseengineering security rfFirst of all, I would like to register that this post has no intention to teach how to break the laws, to ensure this I will omit the car model and suppress any other information that could open a window for malicius people. I want to mension that it is just a theme that should be developed for s... Read More
-
Reversing a BIOS Flash Via Hardware - First Steps
Tags: reverseengineering securityThis brief tutorial about dumping the BIOS (Basic Input/Output System) content directly via hardware (Programmer MiniPro TL866), will pass to you the procedure executed to get BIOS binary code. Other articles of this blog will cover binary contents analysis and some modifications based on its dis... Read More
Popular Tags
digitalprocessing
security
softwaredevelopment
control
computernetwork
reverseengineering
rf
embeddedsystems