Authentication Downgrade Attacks on Enterprise IoT Mobile Applications

Information Disclosure in Embedded IoT Web Applications

Uncovering Unencrypted Data Flows to the Public Internet

Searching Firmware for Hardcoded Secrets

From Unlocked Bootloader to Root Shell

Detailing a vulnerability in the Viidure mobile application that fails to validate server certificates in TLS communications

Detailing the Hanwha firmware file decryption method

A guide for conducting an IoT Pentest

A prioritized list of tools for getting started in hardware hacking

Proxying HTTP traffic from mobile devices using Caido and Frida

Critical encryption flaws discovered in UDP P2P protocol in VStarcam CB73

Firmware extraction and reverse engineering of VStarcam CB73 root password
