Analysis Report on Malicious Activities of Hacker Organizations Using BusyBox Components for IoT Device Attacks

Analysis Report on Malicious Activities of Hacker Organizations Using BusyBox Components for IoT Device Attacks

Author | Zhang Jiaqiu Liu Zhongjin 1 Introduction to BusyBox Components BusyBox is a commonly used component in embedded Linux, known as the “Swiss Army Knife of Embedded Linux.” It integrates commonly used UNIX commands into a single executable file. By streamlining functionality and sharing code, BusyBox retains the most commonly used features while significantly … Read more

Dog Barks and Plays with Embedded – I2C Protocol Analysis

Dog Barks and Plays with Embedded - I2C Protocol Analysis

0x00 Introduction Hacking embedded products has always been a hot topic. More and more attackers are targeting IoT embedded devices. Unlike traditional software security research, this type of research often requires a combination of relevant hardware knowledge and devices. In this article, Wang Wang will share practical cases and corresponding tool usage for the I2C … Read more