Victor PasknelLoRaWAN Network MappingLow-Power Wide-Area Network (LPWAN) is a new type of wireless technology that enables long range connectivity for resource constrained IoT…Aug 16, 2023Aug 16, 2023
Victor PasknelAttacking DevOps ecosystems with EpyonEpyon is a swiss army knife tool for pentesting DevOps ecosystems. It has multiple modules for performing actions in common DevOps systems.Jan 25, 2023Jan 25, 2023
Victor PasknelAttacking Docker EnvironmentsIn this post, I will talk about performing attacks in containers and share some ideas for post-exploitation in Docker environments. I will…Jun 21, 20192Jun 21, 20192
Victor PasknelAnalyzing large password dumps with Elastic Stack and PythonDuring my recent vacation, I began using the Elastic Stack (a.k.a ELK Stack) and had the idea to analyze large password dumps with…Jul 7, 20181Jul 7, 20181
Victor PasknelHow I got into hacking ultrasound machines: Part 03In the previous posts, I presented a little bit of my research in medical device security and described how DICOM can be used to obtain…May 20, 2018May 20, 2018
Victor PasknelHow I got into hacking ultrasound machines: Part 02In the first post of this series, I described how I got into medical device security and did a brief introduction to DICOM [1]. This time I…Feb 23, 20181Feb 23, 20181
Victor PasknelHow I got into hacking ultrasound machines: Part 01In this new series of posts, I will present a short version of the talks that I gave last year at H2HC and NullByte (Security Conferences…Feb 14, 2018Feb 14, 2018
Victor PasknelHacking the IoT with MQTTIn this post i will talk about the MQTT protocol and some security concerns related to it. Some real examples and proof of concept code…Jul 19, 20171Jul 19, 20171
Victor PasknelHacking the Nokē PadlockIn this post i will present my research in Morphus Labs about the Nokē Padlock. The purpose of this research was to analyze the security…Apr 13, 20171Apr 13, 20171