PinnedYou CAN Hack CarsCar theft in the wild has gone high tech. By exploiting the unencrypted CAN (controlled area network) in the headlight of a Toyota RAV 4…Apr 27, 20233Apr 27, 20233
PinnedPublished inSystem WeaknessChatGPT Linux Privilege EscalationChatGPT can give you tips on privilege escalation—though you will need to prompt it to help you avoid privilege escalantion. You will…Mar 30, 2023Mar 30, 2023
PinnedFuzz Open Source, Get Paid by GoogleThe OSS-Fuzz project by Google increased their rewards. How you earn: integrate OSS-Fuzz into a critical open source project and find bugs…Feb 9, 20231Feb 9, 20231
PinnedPublished inSystem WeaknessChatGPT for Blue Teams and AnalysisUse ChatGPT for various blue team tasks.Feb 15, 2023Feb 15, 2023
PinnedPublished inSystem WeaknessChatGPT hacking tools for bug bounty, pentesting, blue teams, and moreHackers aren’t shy in exploiting brilliant tools like ChatGPT. They have used ChatGPT’s capabilities to speed up script writing…Jan 11, 20232Jan 11, 20232
Published inCoinmonksWeb2, Web3 All HackableWeak security, bad security practices, and fragile engineering designs underpin nearly every digital system. But it’s not all hopeless.Aug 5Aug 5
Published inOSINT TeamFuzzing Can Stop IT MeltdownsCrowdStrike can prevent catastrophic IT glitches with modern code testing techniques in their QA process.Jul 22Jul 22
Published inCoinmonksWhat I Learned from a Web3 ConferenceI’ve been in cybersecurity in Web2 for 10 years. In my first foray into web3, this is what I’ve learned.Jul 172Jul 172
Published inCoinmonksHack Smart ContractsCombining LLMs (large language models) and fuzzers, hackers can own smart contracts and earn bounties—in a much more automated way.Jun 121Jun 121
Virtual Patching CarsUntil a proper patch is delivered OTA (over the air), technologies like virtual patching are an interim protection until that patch is…Apr 30Apr 30