Tarlogic's Blog - Cybersecurity - Page 4

Cybersecurity articles with security analysis and ethical hacking technics information

OWASP FSTM, step 8: Runtime analysis
OWASP FSTM, step 8: Runtime analysis

Static analysis of the firmware and its executables provides only a limited amount of information about its operation and performing further analysis at that stage is inefficient i[...]

Read more
OWASP FSTM, step 7: Dynamic analysis
OWASP FSTM, step 7: Dynamic analysis

The dynamic analysis phase is defined as the study of the running device in a real or emulated environment. For this purpose, the device is analyzed, trying to delve into possible [...]

Read more
OWASP FSTM step 6: firmware emulation
OWASP FSTM step 6: firmware emulation

Step 6 of the OWASP FSTM methodology shows how to perform firmware emulation of a device and builds on the previous steps[...]

Read more
Wi-Fi Sniffer for Windows and 802.11 packet viewer
Wi-Fi Sniffer for Windows and 802.11 packet viewer

Acrylic Suite is a software developed by Tarlogic team that provides a powerful WiFi sniffer to analyse communications and WiFi security on Windows 11 and Windows 10 computers. To [...]

Read more
CVE-2022-42889: Text4Shell, Critical Vulnerability in Apache Commons Text
CVE-2022-42889: Text4Shell, Critical Vulnerability in Apache Commons Text

As happened in December last year with Log4Shell, the vulnerability that affected a multitude of Java products that made use of the Log4J library, a new alert has arisen for the vu[...]

Read more
OWASP FSTM, stage 5: Analyzing filesystem contents
OWASP FSTM, stage 5: Analyzing filesystem contents

The operation of IoT and embedded devices relies on an operating system that stores configuration and executable files in a file system embedded in the firmware. This article focus[...]

Read more
Google messes up: Office 365 login portal is not from Microsoft
Google messes up: Office 365 login portal is not from Microsoft

«Office 365 login» With those words, many people start their workday to authenticate to Microsoft’s web tools, with which their companies are integrated. This Google search[...]

Read more
OWASP FSTM, stage 4: Extracting the filesystem
OWASP FSTM, stage 4: Extracting the filesystem

Many IoT devices run an embedded Linux operating system that can be found included in the firmware image, along with the corresponding file systems. This article discusses the iden[...]

Read more
OWASP FSTM, stage 3: Analyzing firmware
OWASP FSTM, stage 3: Analyzing firmware

Analyzing a firmware dump is not a simple task that can be summarized in simple steps to obtain a formula valid for all cases. Different techniques that can help extracting data fr[...]

Read more
OWASP FSTM, stage 2: Obtaining IOT device firmware
OWASP FSTM, stage 2: Obtaining IOT device firmware

This article explains the possible mechanisms for obtaining IoT device firmware[...]

Read more
1 2 3 4 5 6 7 12