In this write-up, I will share how one can go about analyzing radio signals transmitted over the air. This would be useful in the event if you are attempting to identify weakness in a device that you may own. As part of the Proof-Of-Concept (PoC), I purchased a doorbell that…


In this write-up, I will detail my walkthrough on exploiting a vulnerable HTTP web server with a non-executable stack using the return-to-libc attack. …


[Author’s note: SingTel rolled out the new patch (Dual_SIG_1.01.101) to Singapore users after working with Askey prior to this blog post.]

Foreword:

As part of my research, I was surprised to find that the Askey AP5100W Access Point (AP) in my home was vulnerable to WiFi Protected Setup (WPS) offline brute…


TL; DR. Most of us today may have the perception that the use of Wi-Fi (IEEE 802.11) comes with an inherent risk; an attacker in close proximity could perform an attack which continuously disconnects a client from the Wi-Fi network. Such an attack is often termed as a non-persistent denial…


[Disclaimer: The goal of this article is to bring academic insights to the functionalities of MCU chips and to shed light on how IoT devices can be susceptible to hardware implant attacks by malicious attackers. The insights shared are purely for learning purposes.

The author and CSG do not condone…


[Disclaimer: The goal of this article is to bring academic insights to the functionalities of MCU chips and to shed light on how IoT devices can be susceptible to hardware implant attacks by malicious attackers. The insights shared are purely for learning purposes. …


TL;DR. If you have used a remote control to change your television’s channel, to power on or off your air conditioner or even your fan, you would have been a user of infrared radiation (also known as IR) technology. IR technology was made available to consumers as early as the…


TL;DR Disable WPS on your router or access point today! Otherwise, an attacker could gain a foothold into your network and plan for further attacks.

In my own research, I was surprised that my home router was vulnerable to WPS offline brute force attack. What that means was that an…


Background:

The use of Internet-of-Thing (IoT) brings about myriad benefits and is increasingly transforming the way we live, making our life easier. Traditionally, the control of our home devices such as turning on or off the lights, boiling water in a kettle or cooling the house with an air conditioner…


Background

Zigbee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios, such as for home automation. Hence, Zigbee is a low-power, low data rate, and close proximity (i.e., personal area) wireless ad hoc network.

ZigBee uses…

Keith Tay

Cyber-Enthusiast | IoT Specialist | Penetration Testing | Red Teaming

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store