Part 1 - Intro
- Journey into an insecure network camera.
Part 2 - Hardware
- A look into the general hardware of the camera.
Part 3 - Software Audit and Overview
- A look into the software behind the camera.
Part 4 - Hashing
- A look into the password hashing protocol.
Part 5 - Basic Fuzzing
- Basic tampering with packets to get crashes.
Part 6 - Advanced Fuzzing
- Advanced tampering with packets to get crashes.
Part 7 - Fuzzing with Radamsa
- Fuzzing with radamsa automatic fuzzer.
Part 8 - Brute Force
- Brute forcing passwords.
Part 9 - Denial of Service
- DOS attacks on this platform
Built With Crystal