TCP/IP Protocol Analysis Tutorial and Experiment (2nd Edition)

TCP/IP Protocol Analysis Tutorial and Experiment (2nd Edition)

✦ Course Teaching Outline ✦ 1 Basic Course Information Course Chinese Name TCP/IP Protocol Analysis Course English Name TCP/IP Protocol Analysis Course Category Compulsory Applicable Majors Network Engineering, Internet of Things Engineering, Computer Science and Related Majors Total Class Hours 32 Total Credits 2 Prerequisite Courses Computer Networks Co-requisite Courses None Subsequent Courses Network Security, … Read more

Practical Exploitation of CoAP Protocol Vulnerabilities

Practical Exploitation of CoAP Protocol Vulnerabilities

This article is an excellent piece from the Kanxue Forum. Kanxue Forum Author ID: Feng Yi Ying Han It seems that there is very little content related to the CoAP protocol on domestic security forums like Kanxue, and the CVEs mainly involve vulnerabilities in the CoAP protocol library. Therefore, I will organize and record my … Read more

Dog Barks and Plays with Embedded – I2C Protocol Analysis

Dog Barks and Plays with Embedded - I2C Protocol Analysis

0x00 Introduction Hacking embedded products has always been a hot topic. More and more attackers are targeting IoT embedded devices. Unlike traditional software security research, this type of research often requires a combination of relevant hardware knowledge and devices. In this article, Wang Wang will share practical cases and corresponding tool usage for the I2C … Read more