Posted on Friday, December 19th, 2014 by Pedro Venda.
No software is ever free from bugs and security vulnerabilities, such is life. Today is Git’s turn with CVE-2014-9390 – a serious vulnerability has been detected on Git client by which an attacker could be able to inject executable code onto the clients of a given repository. This issue manifests in case insensitive file systems, […] Read More
Posted on Friday, December 19th, 2014 by Iain Lewis.
In our previous demo we talked about Scraping Memory From Android Phones With JTAG. This time we’ll be showing you how to get the PIN information from that scraped memory, and bruteforce it. The attack So, I had grabbed two images from a Google Nexus 4, one of the User Data partition (containing all the […] Read More
Posted on Wednesday, December 17th, 2014 by Ken Munro.
This video demo shows how a hacker can scrape the memory from a stolen Android device. By grabbing the User Data and Meta Data partitions in this way it opens up the path to getting the PIN. With this hacking demo we’re looking at JTAG ports, and how to use them to scrape memory. What […] Read More
<< Older posts