![](https://www.tarlogic.com/wp-content/themes/Avada-Child-Theme/images/cybersecurity_s.webp)
TARLOGIC's BLOG
Cybersecurity - Page 5
Cybersecurity articles with security analysis and ethical hacking technics information
![OWASP FSTM step 6: firmware emulation](https://www.tarlogic.com/wp-content/uploads/2022/11/OWASP-etapa-6-V1.webp)
OWASP FSTM step 6: firmware emulation
Step 6 of the OWASP FSTM methodology shows how to perform firmware emulation of a device and builds on the previous steps[...]
Read more![Wi-Fi Sniffer for Windows and 802.11 packet viewer](https://www.tarlogic.com/wp-content/uploads/2015/02/sniffed_wifi_packet.png)
Wi-Fi Sniffer for Windows and 802.11 packet viewer
Acrylic Suite is a software developed by Tarlogic team that provides a powerful WiFi sniffer to analyse communications and WiFi security on Windows 11 and Windows 10 computers. To [...]
Read more![CVE-2022-42889: Text4Shell, Critical Vulnerability in Apache Commons Text](https://www.tarlogic.com/wp-content/uploads/2022/10/CVE-2022-42889-EN1.jpg)
CVE-2022-42889: Text4Shell, Critical Vulnerability in Apache Commons Text
As happened in December last year with Log4Shell, the vulnerability that affected a multitude of Java products that made use of the Log4J library, a new alert has arisen for the vu[...]
Read more![OWASP FSTM, stage 5: Analyzing filesystem contents](https://www.tarlogic.com/wp-content/uploads/2022/10/IoT-file-system-2.jpg)
OWASP FSTM, stage 5: Analyzing filesystem contents
The operation of IoT and embedded devices relies on an operating system that stores configuration and executable files in a file system embedded in the firmware. This article focus[...]
Read more![Google messes up: Office 365 login portal is not from Microsoft](https://www.tarlogic.com/wp-content/uploads/2022/10/Google-la-lia-1.jpg)
Google messes up: Office 365 login portal is not from Microsoft
«Office 365 login» With those words, many people start their workday to authenticate to Microsoft’s web tools, with which their companies are integrated. This Google search[...]
Read more![OWASP FSTM, stage 4: Extracting the filesystem](https://www.tarlogic.com/wp-content/uploads/2022/09/OWASP-FSTM-stage-4-EN.jpg)
OWASP FSTM, stage 4: Extracting the filesystem
Many IoT devices run an embedded Linux operating system that can be found included in the firmware image, along with the corresponding file systems. This article discusses the iden[...]
Read more![OWASP FSTM, stage 3: Analyzing firmware](https://www.tarlogic.com/wp-content/uploads/2022/09/owasp-firmware-1-en.jpg)
OWASP FSTM, stage 3: Analyzing firmware
Analyzing a firmware dump is not a simple task that can be summarized in simple steps to obtain a formula valid for all cases. Different techniques that can help extracting data fr[...]
Read more![OWASP FSTM, stage 2: Obtaining IOT device firmware](https://www.tarlogic.com/wp-content/uploads/2022/09/firmware-EN.jpg)
OWASP FSTM, stage 2: Obtaining IOT device firmware
This article explains the possible mechanisms for obtaining IoT device firmware[...]
Read more![OWASP FSTM, stage 1: Information gathering and reconnaissance](https://www.tarlogic.com/wp-content/uploads/2022/09/OWASP-portada-EN.jpg)
OWASP FSTM, stage 1: Information gathering and reconnaissance
This article presents the first stage of the OWASP FSTM methodology for firmware analysis of IoT devices.[...]
Read more![If you trade in the Ethereum blockchain, you will lose your money. Here is why](https://www.tarlogic.com/wp-content/uploads/2022/07/Ethereum-trading-EN.jpg)
If you trade in the Ethereum blockchain, you will lose your money. Here is why
You think you have developed a sense of how to invest in the cryptocurrency market? Maybe you can look at a price graph, add a couple of indicators, and tell whether the price will[...]
Read more