Vulnerability Research

A man writing code in his office

No Hardware, No Problem: Emulation and Exploitation

Vulnerability Hunting for Sport If you’ve been following our blog, you might notice some favoritism when it comes to embedded targets… We’ve been exploring the NETGEAR R7000 for several blog posts. This pattern stems from a number of product characteristics, one of which is that the device is easy to emulate in QEMU, which provides an alternative to testing the …

No Hardware, No Problem: Emulation and Exploitation Read More »

The walls have ears

Modern business often relies heavily on the Internet and software resources such as Zoom or Skype to support daily operations. Use of such systems often requires additional hardware resources like microphones and cameras. Advances in computing has provided a pathway for these very ordinary hardware commodities to develop into resources that enrich user experience through …

The walls have ears Read More »