Magspoof – Wirelessly Spoof Magnetic Stripereaders
MagSpoof is a device that can spoof or emulate any magnetic stripe or credit card and it can work wirelessly even on standard magstri...
The Right Way to Publish a CVE
In research, Mar 17, 2021IoT Reversing 101: Discovery
In hw-hacking, iot-security, reversing, Mar 15, 2021The Amazing World of File Fuzzing
In research, Mar 14, 2021Dinoflux
Jose Ramon Palanco holds a Telecommunications Engineering degree from The University of Alcala de Henares in Madrid. Jose Ramon is th...
Read MoreAll Stories
Magspoof – Wirelessly Spoof Magnetic Stripereaders
MagSpoof is a device that can spoof or emulate any magnetic stripe or credit card and it can work wirelessly even on standard magstripe credit card readers by generating a strong elec...
In hw-hacking, iot-security, Mar 21, 2021The Right Way to Publish a CVE
A CVE is a dictionary of publicly known cybersecurity vulnerabilities which is intended to uniquely identify and name publicly disclosed vulnerabilities pretraining to specific versio...
In research, Mar 17, 2021IoT Reversing 101: Discovery
Before we delve into the world of reverse engineering, we need to discuss what engineering as a whole actually is.
In hw-hacking, iot-security, reversing, Mar 15, 2021The Amazing World of File Fuzzing
The world of File Fuzzing is filled with a truly spectacular display of testing. It is the latest shift in software injection and is worth anyone’s attention. But do you really know w...
In research, Mar 14, 2021Modern Hash Cracking
When it comes to has-cracking, a hash-cracking program which works on an enormous database of hashes can guess many millions or billions of possible passwords automatically and compar...
In research, Aug 09, 2020Neverwave: IDS/IPS like functionality in your browser with TLS inspection
During the last years IDS/IPS technology has helped to detect malicious activity not only in the server side but also in the clients side. Actually, we experience an increasing volume...
In Projects, Jun 14, 2020Pentesting iOS Apps with OSX and a Jailbroken device
Today we will explain how to perform a basic security assessment on an iOS Application using Mac. For this assessment it is mandatory your IOS device is jailbroken. I assume you have ...
In hacking, reversing, Apr 05, 2020OT Security at h-c0n 2020
Over the last few years OT devices have been increasingly exposed to the internet, IoT devices have progressively approached the industry and this has caused us to face different chal...
In talks, hw-hacking, iot-security, Jan 31, 2020Klara: Private retrohunting platform
Let’s talk about malware hunting. Sometimes you may find an interesting malware sample, and after reversing it you realize that the binary has characteristics that make it unique like...
In intelligence, research, Apr 18, 2019