Recent posts from our blog

 
ubertooth.jpg

Exploiting Bluetooth Low Energy using Gattacker for IoT

In this post, we are going to discuss about how to take over a BLE based IoT smart bulb, sniff the communication packets and perform modification and replay based attacks - all in a setup that costs < $10.

Some of the things we are going to cover in this post:

  • Installing and Configuring Gattacker

  • Analyzing Advertisement and Service packets for an IoT device

  • Overhearing and dumping the data transferred between the mobile and the device

  • Performing a replay attack with the dumped file

Read the full post here

 
attify-bagde.jpg

Introduction to the Attify Badge

Welcome to the new blog post by Attify. In this blog post, we will introduce our newest creation – Attify Badge, something which we use in order to perform hardware exploitation and to hack IoT devices.

This is also covered extensively in our training course “Offensive IoT Exploitation”, where we teach attendees on how to exploit the smart devices. We use this to perform UART sniffing, root over serial, JTAG debugging, dumping memory and so on.

Read the full post here.