TARLOGIC's BLOG
Cybersecurity - Page 7
Cybersecurity articles with security analysis and ethical hacking technics information
Google messes up: Office 365 login portal is not from Microsoft
«Office 365 login» With those words, many people start their workday to authenticate to Microsoft’s web tools, with which their companies are integrated. This Google search[...]
Read more
OWASP FSTM, stage 4: Extracting the filesystem
Many IoT devices run an embedded Linux operating system that can be found included in the firmware image, along with the corresponding file systems. This article discusses the iden[...]
Read more
OWASP FSTM, stage 3: Analyzing firmware
Analyzing a firmware dump is not a simple task that can be summarized in simple steps to obtain a formula valid for all cases. Different techniques that can help extracting data fr[...]
Read more
OWASP FSTM, stage 2: Obtaining IOT device firmware
This article explains the possible mechanisms for obtaining IoT device firmware[...]
Read more
OWASP FSTM, stage 1: Information gathering and reconnaissance
This article presents the first stage of the OWASP FSTM methodology for firmware analysis of IoT devices.[...]
Read more
If you trade in the Ethereum blockchain, you will lose your money. Here is why
You think you have developed a sense of how to invest in the cryptocurrency market? Maybe you can look at a price graph, add a couple of indicators, and tell whether the price will[...]
Read more
Tracking Ethereum blockchain crypto attackers: Measuring sandwich attacks
There are malicious actors perpetrating attacks in the Ethereum blockchain. However, due to its open and public nature, it is possible to identify and track down some of those atta[...]
Read more
CVE-2022-26134. Zero Day vulnerability affecting Atlassian Confluence
A remote code execution vulnerability affecting Atlassian Confluence products has recently been identified and assigned CVE-2022-26134. This vulnerability is exploitable without re[...]
Read more
PLCTool plugin support
The newly implemented plugin support of PLCTool allows for the addition of new functionalities without the need of modifying the base code This article presents PLCTool’s plugin [...]
Read more
Introduction to fuzzing: How to automatically discover bugs
Fuzzing techniques are used to detect security breaches and other bugs by generating inputs not contemplated by the programmer ¿What’s Fuzzing? – Security testing Fuzz[...]
Read more