Whitepaper on hacking smart switches to capture credentials for a network.
f8f67bb8bd3d07c337c5634f1d46b38d4f4c0584c9fdd46ad313d8f83fd77937
Whitepaper called Skippipe: Skipping the watermark in digital content.
cb5c29aa69a59a6fcfed058f0097df5a5ce31836d2ed8c91969ddacb5f2ad521
Whitepaper called Don't Break The Door, The Key Is Under The Doormat.
e7e4105f7c52ed138e43edf0a901c3125fc58e88375089f39ed0a16c487ff549
This whitepaper discusses acquiring VoIP parameters to take advantage of it and will demonstrate how to extract the password parameter from the provisioning mechanism used by Adamo Telecom Iberia S.A.U.
5e9e150fa23861dfaf419e244d39cf6892721ab6ea566dfdf2cfe52eacf2018c
Inteno EG200 routers with firmware versions EG200-WU7P1U_ADAMO3.16.4-190226_1650 and below have a JUCI ACL misconfiguration that allows the "user" account to extract the 3DES key via JSON commands to ubus. The 3DES key is used to decrypt the provisioning file provided by Adamo Telecom on a public URL via cleartext HTTP.
39f36f4b6db5a31b0de8f71b6618765de1c62790a395b11e89b90ba6c5ca5670
Whitepaper called BluedIoT: When a mature and immature technology mixes, becomes an "idiot" situation.
4eab7ec628ce14a044cbf3026b1eca54090b4b6e66a555432e12bdd87dfeb531