Social Engineering Dos and Don'ts

Comments | Continue reading


@pentestpartners.com | 1 year ago

Vulnerabilities that aren’t. ETag headers

Continue reading


@pentestpartners.com | 1 year ago

SkyFail: 6M Routers Left Exposed

Continue reading


@pentestpartners.com | 2 years ago

Security flaws found in popular EV chargers

Continue reading


@pentestpartners.com | 2 years ago

Getting a persistent shell on a 747 IFE

Continue reading


@pentestpartners.com | 2 years ago

DLL Hijacking in Nvidia SMI

Continue reading


@pentestpartners.com | 3 years ago

Breaking Samsung Firmware, or Turning Your S8/S9/S10 into a DIY “Proxmark”

Continue reading


@pentestpartners.com | 3 years ago

Double-Free RCE in VLC

Continue reading


@pentestpartners.com | 3 years ago

Reverse Engineering a 5g ‘Bioshield’

Continue reading


@pentestpartners.com | 3 years ago

Gdpr.eu has er a data leakage issue

Continue reading


@pentestpartners.com | 3 years ago

Router hacking, dumping the firmware from an SPI flash chip

Continue reading


@pentestpartners.com | 4 years ago

Fill your Boots with credential stuffing protections

Continue reading


@pentestpartners.com | 4 years ago

Minecraft to Metasploit. Game hacking could start your cyber security career

Continue reading


@pentestpartners.com | 4 years ago

Ships can’t be hacked. Wrong

Continue reading


@pentestpartners.com | 4 years ago

Pen Testing Ships. A year in review

Continue reading


@pentestpartners.com | 4 years ago

Reverse Engineering Tesla Hardware

Continue reading


@pentestpartners.com | 4 years ago

Reverse Engineering the Tesla Firmware Update Process

Continue reading


@pentestpartners.com | 4 years ago

Osint for Avionics

Continue reading


@pentestpartners.com | 4 years ago

Drilling open a smart door lock in 4 seconds

Continue reading


@pentestpartners.com | 4 years ago

Burning Down the House with IoT

Continue reading


@pentestpartners.com | 4 years ago

The not so ultra lock

Continue reading


@pentestpartners.com | 4 years ago

How to Kill a Tesla via Bluetooth

Continue reading


@pentestpartners.com | 4 years ago

How to Do Firmware Analysis. Tools, Tips, and Tricks

Continue reading


@pentestpartners.com | 4 years ago

Cobalt Strike Walkthrough for Red Teamers

Continue reading


@pentestpartners.com | 5 years ago

Tic Toc Pwned – Child tracking smartwatch API flaws

Continue reading


@pentestpartners.com | 5 years ago

GPS watch issues… Again

Continue reading


@pentestpartners.com | 5 years ago

Tracking and snooping on a million kids

Continue reading


@pentestpartners.com | 5 years ago

‘Secure by Design’ and SB-327. Standards for a Secure IoT?

Continue reading


@pentestpartners.com | 5 years ago

Running a Security Awareness Program

Continue reading


@pentestpartners.com | 5 years ago

Hacking a Nerf Assault Tank

Continue reading


@pentestpartners.com | 5 years ago

Hardware reverse engineering. A tale from the workbench

Continue reading


@pentestpartners.com | 5 years ago

Totally Pwning the Tapplock Smart Lock

Continue reading


@pentestpartners.com | 5 years ago

Penetration Testing Requirements for GDPR

Continue reading


@pentestpartners.com | 5 years ago