hacking
-
This post documents my first hardware hacking project: dumping the firmware from a Reolink E1 Pro security camera. Just to be clear, I was (and still am) a complete beginner when it comes to hardware hacking. I did this together with my roommate, who had slightly more experience than me and already owned some basic…
-
Back in September 2024, I went to Hexacon. This is a security conference organized by Synacktiv, mostly focused on reverse engineering and vulnerability researching.This year’s sponsors were, but not limited to: This is the time when major companies and independent security researchers present their discoveries, whether from this year or the previous one. Some highlight…
-
Privilege escalation on Windows through a card printer software CVE-2024-34329 Back in May, I was playing around with a card printer software I had previously installed on my laptop for a security workshop my company had organized to demonstrate how easy it is to clone another company’s employee badge. On Windows, it is possible to…
-
Depending on the technologies used on your web application, you could be vulnerable to multiple different types of injections. We will discuss 4 popular injection attacks and how to mitigate them. Most of the information from this blog comes directly from OWASP and PortSwigger. Small confession… I wrote this blogpost mostly for myself, to study…
