Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Trend Micro
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Looking at the Attack Surfaces of the Kenwood DMX958XR IVI
November 21, 2024 | Connor Ford
CONTINUE READING
SUBSCRIBE
Blog post
A Detailed Look at Pwn2Own Automotive EV Charger Hardware
November 29, 2023
Automotive
,
Pwn2Own
,
Reverse Engineering
Blog post
Looking at Patch Gap Vulnerabilities in the VMware ESXi TCP/IP Stack
July 27, 2022
VMware
,
Research
,
Reverse Engineering
Blog post
The Battle Between White Box and Black Box Bug Hunting in Wireless Routers
March 11, 2021
NETGEAR
,
Reverse Engineering
,
Research
Blog post
MindShaRE: How to “Just Emulate It With QEMU”
May 27, 2020
MindshaRE
,
Reverse Engineering
,
QEMU
Blog post
MindShaRE: Dealing with encrypted router firmware
February 06, 2020
MindshaRE
,
Router
,
Reverse Engineering
Blog post
MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router
September 03, 2019
MindshaRE
,
Belkin
,
Research
,
Reverse Engineering
Blog post
MindShaRE: Automated Bug Hunting by Modeling Vulnerable Code
July 16, 2019
MindshaRE
,
Research
,
Reverse Engineering