Practical Exploitation of CoAP Protocol Vulnerabilities

Practical Exploitation of CoAP Protocol Vulnerabilities

This article is an excellent piece from the Kanxue Forum. Kanxue Forum Author ID: Feng Yi Ying Han It seems that there is very little content related to the CoAP protocol on domestic security forums like Kanxue, and the CVEs mainly involve vulnerabilities in the CoAP protocol library. Therefore, I will organize and record my … Read more

Basic Principles of HTTP in Testing Development Training

Basic Principles of HTTP in Testing Development Training

Basic Principles of HTTP in Testing Development Training 1. Difference Between URL and URI The full name of URI: Uniform Resource Identifier. The full name of URL: Universal Resource Locator. URL is a subset of URI, meaning that every URL is a URI, but not every URI is a URL. The address we enter in … Read more

Building An Intelligent Security Control Platform For Data Centers Using IoT

Building An Intelligent Security Control Platform For Data Centers Using IoT

We welcome fintech professionals to actively submit articles! Everyone is encouraged to express their opinions! Submission email: [email protected] —— Financial Electronicization Written by / China Everbright Bank Information Technology Department Comprehensive Intelligent Control Platform Project Team: Peng Xiao, Wang Gang, Li Anhuai, Dai Liang, Chen Yong The data center is one of the core production … Read more

NI Platform-Based HIL Systems Accelerate Development for New Energy Vehicles

NI Platform-Based HIL Systems Accelerate Development for New Energy Vehicles

As technology continues to converge, we need a more agile and flexible development platform to support the full lifecycle testing of ECUs. The stages of ECU lifecycle testing are listed from left to right, representing the transition from pure software testing to pure physical testing. The left side utilizes more model-based technologies, which provides higher … Read more

Gallia: An Extensible Penetration Testing Framework for Automotive Security

Gallia: An Extensible Penetration Testing Framework for Automotive Security

About Gallia Gallia is an extensible penetration testing framework focused on automotive security. This tool can perform penetration testing on an entire vehicle and even test individual vehicle ECUs. Currently, Gallia mainly targets the UDS interface and utilizes a modular design to implement logging and archiving functionalities separately. As a general interface, the logging function … Read more

WEF: A Powerful Wi-Fi Security Testing Framework

WEF: A Powerful Wi-Fi Security Testing Framework

About WEF WEF stands for WiFi Exploitation Framework, a powerful Wi-Fi security testing framework. WEF implements its functionality based on 802.11 networks and protocols and contains numerous security testing components targeting WPA/WPA2 and WEP, helping researchers conduct automated penetration testing for Wi-Fi and Bluetooth. The current version of WEF supports Kali Linux, Parrot OS, Arch … Read more

What Are the Patterns of Government-Promoted Storage Chips?

What Are the Patterns of Government-Promoted Storage Chips?

Source: The World of Photolithography Storage is born alongside data; wherever there is data, there will be a need for storage chips. Moreover, with the development of emerging industries such as big data and the Internet of Things, the storage industry is closely related to information security. The total global output value of storage chips … Read more

How to Test Encrypted APIs?

How to Test Encrypted APIs?

Generate an information digest from plaintext encoding to prevent tampering. For example, MD5 uses a hash algorithm, which outputs a 128-bit string regardless of the input length. The digest algorithm does not require a secret key; both the client and server can use the same digest algorithm to obtain consistent ciphertext for the same plaintext. … Read more

Understanding Block Ciphers: A Comprehensive Overview

Understanding Block Ciphers: A Comprehensive Overview

Reliable and Efficient: The Block Cipher Written by | Teacher Kang In the previous five issues, we discussed the intrinsic characteristics and structures of cryptography, as well as the relationship between cryptography and security. Starting from this issue, we enter the second part of this series – the

Understanding Android Signature Versions: v1, v2, v3, and v4

Understanding Android Signature Versions: v1, v2, v3, and v4

This article is authored by Jiu Xin, originally published at: Jiu Xin Says. Introduction Recently, I helped the testing team with some signature-related requirements, and today I would like to briefly discuss the topic of signatures with everyone. If you ask why Android needs signatures, everyone might think of the official explanation: ❝ The Android … Read more