This is hopefully the most useless blog post you will read this year as this post will detail our experience dealing with ransomware cases. It is one…

Lire la suite

In this final part of this series, we are finally going to explain how the stack-based buffer overflow vulnerability can be exploited to gain…

Lire la suite

In this fourth part of the series, we analyze the memory corruption identified previously and manage to overwrite the program pointer!

Lire la suite

In this third part of the series, we focus on the exposed web services running on TCP ports 80 and 443.

 

Since a valid exploit chain must achieve code…

Lire la suite

In this second blog post of the series, we start with the reconnaissance phase on the camera, a crucial step in understanding our target.

 

The aim…

Lire la suite