Security Cameras - A Penetration Tester's Journey
Security cameras are ubiquitous in today鈥檚 world, with millions of them installed in homes, businesses, and public spaces around the globe. These cameras are meant to provide a sense of security and surveillance, but they can also be a potential security threat if not properly secured. Working on my master鈥檚 thesis with the support of SECloud (Security Edge and Cloud Lab), and specifically the ACES (Automotive Cyberphysical and Embedded Security) laboratory, I recently had the opportunity to perform a security assessment on an IP Camera to identify any vulnerabilities and potential risks....
Deploy Your VPS Like a BOSS
Deploy websites and a mail server on your VPS using Ansible
Virtual Laptop
Spend your money wisely: buy yourself (and your family) a server instead of new laptops Recently my girlfriend started working an internship at an architecture firm and my sister started her apprenticeship in university. Both of them need Windows for their work (馃ぎ) but unfortunately both of them daily drive an iPad. At first I started looking for old laptops around the house but I quickly gave up because they were all too old and slow to run Windows....
RF Hacking 101
This is my first blog post! With it, I would like to tell you a little bit about how I got into RF hacking and what tools I use to analyze RF signals. My experience Radio Frequency (RF) communications are used in a plethora of devices, the first time I got in touch with RF communication was when in middle school I bought a radio-controlled (RC) car. The communication between the remote and the car used RF to RX/TX throttling and steering, and the remote had a tiny crystal that you could swap with other remotes to control different cars, the same crystal was on the car鈥檚 receiver, you can see what it looked like in the picture....