Posts

Showing posts from June, 2020

Trending

Researchers Hacked EV Car Chargers To Execute Arbitrary Code

EVs face significant cyber risks due to their reliance on interconnected systems and the increasing number of public charging stations, which often lack robust security measures.  Vulnerabilities in EV software and charging infrastructure can expose vehicles to malware, unauthorized access, and potential control by hackers. During Pwn2Own Automotive 2024 in Tokyo, cybersecurity researchers hacked  EV car chargers  to execute arbitrary code. Researchers Hacked EV Car Chargers At the Pwn2Own Automotive 2024 event, researchers exploited three EV chargers:-  Autel MaxiCharger (MAXI US AC W12-L-4G) ChargePoint Home Flex JuiceBox 40 Smart EV Charging Station  They executed arbitrary code via Bluetooth while focusing on the Autel MaxiCharger, and this uncovered the “CVE-2024-23958,” “CVE-2024-23959,” and “CVE-2024-23967”  vulnerabilities . The features of the charger include WiFi, Ethernet, Bluetooth, 4G LTE, RFID, LCD touchscreen, RS485, and a USB-C port. Its har...

Tracking user location from IP address using Google API

Image
If you think your geolocation coordinates are safe by only turning off your user location on your phone or your location services on your browser, think again. How? Let us begin with what an IP address is. Those who want no details on how I identified the issue and only tech details on how to do extract this information, please jump to Fun and Profit section at the bottom. (Edit : I am surprised by the reaction and the interest of many people on this real small article that was a subset of a larger research goal. Initially I had written this article only with a thought of documenting my thought process and if I could get some insights from peers on some further information that I could have a look at. But I am pleased for all the questions I have got and I have edited the article to make it slightly more insightful with more screenshots and deeper explanation. Thank you members from r/privacy and admax88 from r/netsec. Please do not hesitate to comment critically. ...

Malware Analysis Open Source Tools

Image
                                                              Malware Malware is any software intentionally designed to cause damage to a computer, server, client, or a computer network. How malware works Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks. For example, malicious programs can be delivered to a system with a USB drive or can spread over the internet through drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge.  Phishing attacks are another a common type of malware delivery where emails disguised as legitim...

Popular posts from this blog

Ninjutsu OS- Windows based pentesting distribution

Fog Ransomware

New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers