Practical BadUSB Attack Based on Arduino Leonardo

Practical BadUSB Attack Based on Arduino Leonardo

* Original Author: Professor X, this article is part of the FreeBuf original reward plan, reprinting without permission is prohibited. Introduction Many students on Freebuf have shared their views on HID attacks, such as Viks’ ‘Quickly Making Teensy BadUSB with Arduino’, which provides a detailed description of the BadUSB production process both from a popular … Read more

Exploring Hardware Security on a Budget: BadUSB with Arduino

Exploring Hardware Security on a Budget: BadUSB with Arduino

*This article is originally written by: ya0guang. It is part of the FreeBuf original reward program, and reproduction without permission is prohibited. Introduction Given that hardware security is a subject that most newcomers have little exposure to, and it is very appealing, the high prices of some professional security research equipment can be daunting. In … Read more

A Comprehensive Guide to Android Root Detection and Bypass

A Comprehensive Guide to Android Root Detection and Bypass

0x01 Introduction Android is based on the Linux multi-user access control mechanism. By default, applications cannot execute other applications, including reading and writing users’ private data. The process of an application is a secure sandbox (running the application in a restricted security environment, with all changes in the sandbox having no harm to the operating … Read more

DIY Raspberry Pi with Kali Linux: A Step-by-Step Guide

DIY Raspberry Pi with Kali Linux: A Step-by-Step Guide

Due to the impact of the pandemic, I have spent more time at home, and finally have the opportunity to tinker with the Raspberry Pi 4B that I purchased last year. During a large-scale offensive and defensive exercise last year, I heard about the incredible operation of using a drone + Raspberry Pi for wireless … Read more

Transform Your Raspberry Pi into a Penetration Testing Tool

Transform Your Raspberry Pi into a Penetration Testing Tool

*This article is written by: Meow God 2017, and it belongs to the FreeBuf original reward program. Reproduction without permission is prohibited. Preparation and Introduction Once, a friend of mine said he wanted to buy the hak5 Bash Bunny, a network hijacking keyboard injection all-in-one BadUSB. It looked great, but unfortunately, my friend said he … Read more

Mobile Security Penetration Testing Checklist 2022

Mobile Security Penetration Testing Checklist 2022

Original: https://hackersonlineclub.com/mobile-security-penetration-testing/ All-in-One Mobile Security Framework’s mobile security penetration testing checklist, including penetration testing for Android and iOS applications. Mobile Application Security Testing Environment 1. Appie is a portable package for Android Pentesting, a great alternative to existing virtual machines. https://manifestsecurity.com/appie 2. Android Tamer is a virtual/real-time platform for Android security professionals. https://androidtamer.com/ 3. AppUse … Read more