PinnedPublished inAutoSecurityyECU Reverse Engineering & Bypassing UDS SecurityAccess (0x27)I wanted to dive deeper into reverse engineering and binary patching, applying techniques that could also be useful to me in real-world…Feb 251Feb 251
PinnedPublished inInfoSec Write-upsUnderstanding of Voltage Fault Injection — Glitching AttackUnmasking Voltage Fault Injection: A Deep Dive into Crowbar Glitching Attack StrategiesSep 13, 2024Sep 13, 2024
PinnedPublished inAutoSecurityyMQTT Security 101: A Quick Guide to Finding and Exploiting VulnerabilitiesDive into MQTT network security, offering practical steps to pentest & protect your IoT systems. It covers essential topics like…Aug 31, 2024Aug 31, 2024
PinnedUART- Shell Access to RouterSo, it was my birthday, but I was alone, so there was no celebration or cake cutting. I was bored, I looked around me and saw a router…Feb 6, 20221Feb 6, 20221
🚗 CAN Bus Hacking 101 — TryHackMe Room’s Official WalkthroughWelcome to “CAN Bus Hacking 101”! This is our official step-by-step guide to completing the TryHackMe room on CAN Bus hacking. If you’ve…Mar 22Mar 22
A Day of Brainstorming and DiscoveryHarnessing Inner Balance to Decode Outer Complexities.Jan 131Jan 131
Published inAutoSecurityyPlayUDS – UDS Playground for Beginners🚗🔒 Introducing playUDS: A Blackbox UDS Practice Platform!Nov 26, 2024Nov 26, 2024
Self Study for Ethical Hacking (2024 Edition)Alright, today we’re diving into how to start learning cybersecurity or ethical hacking through self-study. I get asked this question a…Oct 18, 2024Oct 18, 2024
The Intersection of AI, Autonomous Driving, and CybersecurityAs autonomous driving technology continues to advance, the integration of artificial intelligence (AI), particularly Large Language Models…Aug 30, 2024Aug 30, 2024