Menu
Hawktesters Research
Search
Menu
  • Hardware Hacking
  • Penetration Testing

Hawktesters ResearchHawktesters ResearchHawktesters Research

  • Web Application Security
  • Cybersecurity
Search
close
close
  • Penetration Testing
  • Web Application Security
  • Hardware Hacking
  • Cybersecurity
  • Common Vulnerabilities and Exposures
  • Hardware Hacking

Practical drone attack via PWM: Reverse engineering and signal injection at the physical layer

  • 3 Min Read
  • Posted byby Samir Sánchez Garnica
  • July 16, 2025
  • Hardware Hacking

Practical drone attack via UDP: Reverse engineering of the wireless control channel

  • 5 Min Read
  • Posted byby Samir Sánchez Garnica
  • July 16, 2025
  • Hardware Hacking

How We Decrypt File Encryption on the TP-Link Tapo C200 Camera

  • 34 Min Read
  • Posted byby Samir Sánchez Garnica
  • July 7, 2025
  • Hardware Hacking

U-Boot Shell password protected

  • 5 Min Read
  • Posted byby Samir Sánchez Garnica
  • July 6, 2025
RBAC
  • Uncategorized

Mixing Boolean Flags with Role-Based Access Control

  • 4 Min Read
  • Posted byby isaac.iglesias@hawktesters.com
  • July 4, 2025
  • Common Vulnerabilities and Exposures

PATH TRAVERSAL(CVE-2024-46327)

  • 2 Min Read
  • Posted byby Samir Sánchez Garnica
  • January 27, 2025
  • Common Vulnerabilities and Exposures

HARDCODED CREDENTIALS(CVE-2024-46238)

  • 1 Min Read
  • Posted byby Samir Sánchez Garnica
  • January 27, 2025
  • Common Vulnerabilities and Exposures

OS COMMAND INJECTION(CVE-2024-46329)

  • 3 Min Read
  • Posted byby Samir Sánchez Garnica
  • January 27, 2025
  • Common Vulnerabilities and Exposures

OS COMMAND INJECTION(CVE-2024-46330)

  • 2 Min Read
  • Posted byby Samir Sánchez Garnica
  • January 27, 2025
  • Hardware Hacking

Timing and power analysis, to attack Passwords, using ChipWhisperer.

  • 17 Min Read
  • Posted byby Samir Sánchez Garnica
  • January 27, 2025

Posts pagination

1 2 Older Posts

Recent Posts

  • Practical drone attack via PWM: Reverse engineering and signal injection at the physical layer
  • Practical drone attack via UDP: Reverse engineering of the wireless control channel
  • How We Decrypt File Encryption on the TP-Link Tapo C200 Camera
  • U-Boot Shell password protected
  • Mixing Boolean Flags with Role-Based Access Control

Recent Comments

  1. Brahiam on Timing and power analysis, to attack Passwords, using ChipWhisperer.
  2. Zero-Day Alert: Scriptcase Vulnerabilities (RCE) - Hawktesters Research on Zero-Day Alert: Scriptcase Vulnerabilities (XSS) 
  3. Zero-Day Alert: Scriptcase Vulnerabilities (XSS)  - Hawktesters Research on Zero-Day Alert: Scriptcase Vulnerabilities (RCE)
Hawktesters Research Blog posting state of the art cybersecurity research
  • Català
  • Français
  • Italiano
  • Español