Exploring Hardware Security on a Budget: BadUSB with Arduino

Exploring Hardware Security on a Budget: BadUSB with Arduino

*This article is originally written by: ya0guang. It is part of the FreeBuf original reward program, and reproduction without permission is prohibited. Introduction Given that hardware security is a subject that most newcomers have little exposure to, and it is very appealing, the high prices of some professional security research equipment can be daunting. In … Read more

Enhancing Functional Safety and Cybersecurity Solutions for Arm Automotive Products

Enhancing Functional Safety and Cybersecurity Solutions for Arm Automotive Products

Disclaimer: The content and images of this article are reprinted from BC-AUTO. 2019 Intelligent Automotive Operating System Industry Research Report 2019 Software-Defined Automotive Industry Research Report 2019 China Intelligent Automotive Industry Mainstream Tier 1 Research Report 2019 Global Intelligent Automotive Cybersecurity and Information Security Industry Research Report 2019 China Onboard Gateway Industry Research Report 2019 … Read more

A Comprehensive Guide to Android Root Detection and Bypass

A Comprehensive Guide to Android Root Detection and Bypass

0x01 Introduction Android is based on the Linux multi-user access control mechanism. By default, applications cannot execute other applications, including reading and writing users’ private data. The process of an application is a secure sandbox (running the application in a restricted security environment, with all changes in the sandbox having no harm to the operating … Read more

IOT Competition Review and MQTT RCE Analysis 2024

IOT Competition Review and MQTT RCE Analysis 2024

One Introduction This year’s West Lake Sword IOT part provided a development board equipped with OpenWrt, and participants needed to analyze the development board and the provided Firmware.zip to answer the questions posed by the organizers. Two Overview of Questions and Score Distribution Since there were no screenshots of the questions retained, I organized the … Read more

Creating a Fire and Theft Prevention System with Raspberry Pi

Creating a Fire and Theft Prevention System with Raspberry Pi

The graduation season is approaching, and this time I joined the army of graduates and rented a house outside. But for some reason, I worry every day at work whether my home will be burglarized? Is there any plug that hasn’t been pulled that might cause a fire? I heard this is a condition, but … Read more

Transform Your Raspberry Pi into a Penetration Testing Tool

Transform Your Raspberry Pi into a Penetration Testing Tool

*This article is written by: Meow God 2017, and it belongs to the FreeBuf original reward program. Reproduction without permission is prohibited. Preparation and Introduction Once, a friend of mine said he wanted to buy the hak5 Bash Bunny, a network hijacking keyboard injection all-in-one BadUSB. It looked great, but unfortunately, my friend said he … Read more

Ensuring Safety in the Internet of Things

Ensuring Safety in the Internet of Things

The Internet of Things must be a security network. Joint prevention and control, close collaboration, truly build a “cloud + network + terminal” three-dimensional defense system, making security a public good for all Internet of Things users. Does installing surveillance cameras make homes safer? Recently, a reporter’s investigation found that spending a hundred yuan to … Read more

Comprehensive Guide to Anti-Debugging Techniques in Android Reverse Engineering

Comprehensive Guide to Anti-Debugging Techniques in Android Reverse Engineering

Comprehensive Guide to Anti-Debugging Techniques in Android Reverse Engineering It has been a while since I last wrote an article. Recently, I have been working on several bank projects, and most financial apps have anti-debugging measures. Today, I would like to share some anti-debugging strategies that I frequently encounter in these projects. The following methods … Read more

The Wealth Secrets of Black Industry in the Blockchain Era

The Wealth Secrets of Black Industry in the Blockchain Era

【New Friends】Click the blue text “Pilu Security Home” below the title to follow 【Old Friends】Click the upper right corner to share or bookmark the wonderful content of this page 【Official Account】Search for the official account: Pilu Security Home, or ID: piluwill Introduction: A recent report by Ars Technica about blockchain currency theft tells how iotaseed.io … Read more

Firmware Analysis of IoT Devices: A Beginner’s Guide

Firmware Analysis of IoT Devices: A Beginner's Guide

Introduction In recent years, IoT devices have infiltrated every aspect of life, bringing great convenience to people. However, due to the data and privacy information generated in daily life, their security has become a growing concern. In the previous article, we discussed controlling Xiaomi devices using scripts, focusing on security analysis from a traffic perspective; … Read more