Cybersecurity blog

Cybersecurity articles with security analysis and ethical hacking technics information

Cybersecurity in LoRa and LoRaWAN: Context and Background

Cybersecurity in LoRa and LoRaWAN: Context and Background

Since the beginning of the 21st century, the concept of Internet of Things (IoT) has gradually evolved from the initial vague ideas related to the interconnection of everyday objec[...]

Read more
Smart Meters – Assessing Concentrator Risk

Smart Meters – Assessing Concentrator Risk

A key element in any remote management infrastructure is the concentrator.  This device, located between the PLC network to which the smart meters are connected and the IP network[...]

Read more
Smart Meters – A proof of concept: hacking a smart meter

Smart Meters – A proof of concept: hacking a smart meter

In previous articles, sufficient evidence has been provided (both from theory and passive observation PLC traffic) to prove that the PRIME protocol is vulnerable to cyberattacks du[...]

Read more
Kerberos (III): How does delegation work?

Kerberos (III): How does delegation work?

Introduction There are several kinds of delegation implemented by using the Kerberos protocol. Basically, delegation allows a service to impersonate the client user to interact wit[...]

Read more
Smart Meters – Threats and Attacks to PRIME Meters

Smart Meters – Threats and Attacks to PRIME Meters

A golden rule in the world of cybersecurity is that the system risk is greater than the aggregate risk of its component elements. This is because, as the number of vulnerable eleme[...]

Read more
Smart Meters – The Spanish Scenario and the Telemanagement System.

Smart Meters – The Spanish Scenario and the Telemanagement System.

Smart meters have become a reality in recent years not only in new housing, but also in older buildings where—by legal requirement—they have had to renew their measuring device[...]

Read more
Vulnerabilities in Ampache (<=3.9.1)

Vulnerabilities in Ampache (<=3.9.1)

During a Red Team operation, multiple vulnerabilities where discovered in Ampache, an open source web platform for audio/video streaming. CVE codes have been assigned for two of th[...]

Read more
Kerberos (II): How to attack Kerberos?

Kerberos (II): How to attack Kerberos?

[...]

Read more
Attacking QA platforms: Selenium Grid

Attacking QA platforms: Selenium Grid

[...]

Read more
Security in Sciter-based applications

Security in Sciter-based applications

[...]

Read more
1 2 3 4