PinnedYou CAN Hack CarsCar theft in the wild has gone high tech. By exploiting the unencrypted CAN (controlled area network) in the headlight of a Toyota RAV 4…Apr 27, 20233Apr 27, 20233
PinnedPublished inSystem WeaknessChatGPT Linux Privilege EscalationChatGPT can give you tips on privilege escalation—though you will need to prompt it to help you avoid privilege escalantion. You will…Mar 30, 2023Mar 30, 2023
PinnedFuzz Open Source, Get Paid by GoogleThe OSS-Fuzz project by Google increased their rewards. How you earn: integrate OSS-Fuzz into a critical open source project and find bugs…Feb 9, 20231Feb 9, 20231
PinnedPublished inSystem WeaknessChatGPT for Blue Teams and AnalysisUse ChatGPT for various blue team tasks.Feb 15, 2023Feb 15, 2023
PinnedPublished inSystem WeaknessChatGPT hacking tools for bug bounty, pentesting, blue teams, and moreHackers aren’t shy in exploiting brilliant tools like ChatGPT. They have used ChatGPT’s capabilities to speed up script writing…Jan 11, 20232Jan 11, 20232
Published inSystem WeaknessHack Next.js with this ExploitSecurity researchers found a zero day exploit in popular programming language Next.js, which Vercel maintains. This post explains how the…Mar 30Mar 30
Published inArtificial Intelligence in Plain EnglishAI Defense: TarpitsArtists, copyright holders, writers, and general content creators have tools available to stop AI crawlers from absorbing their content…Feb 24Feb 24
Published inCoinmonksWeb2, Web3 All HackableWeak security, bad security practices, and fragile engineering designs underpin nearly every digital system. But it’s not all hopeless.Aug 5, 2024Aug 5, 2024
Published inOSINT TeamFuzzing Can Stop IT MeltdownsCrowdStrike can prevent catastrophic IT glitches with modern code testing techniques in their QA process.Jul 22, 2024Jul 22, 2024
Published inCoinmonksWhat I Learned from a Web3 ConferenceI’ve been in cybersecurity in Web2 for 10 years. In my first foray into web3, this is what I’ve learned.Jul 17, 20241Jul 17, 20241