The ubiquitousness of ARM based devices means that malefactors find them more "yummy" for an attack. It's no surprise that shell codes for this platform have long become reality. In spite of the fact that the researchers…
CONTINUE READING 🡒 Category: Security
Root for HDD: expanding the HDD standard capabilities
HDD structure is surely known to everyone, to a certain extent. Basically, it consists of several platters which rotate with the speed of 15,000 rpm, position control device and control electronics module. All this is complemented by…
CONTINUE READING 🡒 Read and execute. Exploiting a new vulnerability in GitLab
In late March 2020, a bug was discovered in a popular web-based tool called GitLab. The error enables the attacker to advance from reading files in the system to executing arbitrary commands. The vulnerability was recognized critical because the attacker doesn’t need any special rights in the…
CONTINUE READING 🡒