Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Category: IoT Pentesting

Can Someone Really Hack Traffic Lights?

February 7, 2024 Adrian Tuchel

We’ve all seen the scenes in movies or games where attackers hack traffic lights to set the colors to their liking, but could this scenario

Continue reading

IoT Pentesting 101: How to Hack MQTT – The Standard for IoT Messaging

April 8, 2022 Ionut Morosan

Pentesting IoT MQTT protocol on emulated environment deployed using mosquitto. Dictionary attacks, DoS, or exploiting dummy ICS Environments are presented.

Continue reading

Top Posts

  • Pentesting Azure: RECON Techniques
  • When AI Understands Code: Prompt Injection to RCE
  • Chained Vulnerabilities in Web Applications
  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • My experience with the OSCP certification

Blog Stats

  • 647,193 hits

Follow us via Email

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 157 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (14)
  • IT Security Assurance (1)
  • IT Security Audit (3)
  • Metasploit (1)
  • Misc (21)
    • Artificial Intelligence (2)
    • Code Review (1)
    • CVE (1)
  • Mobile security (13)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (25)
  • Pentest techniques (30)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Powered by WordPress.com.
 

Loading Comments...