Security in Depth
Taddong Security Advisories
Monday, November 11, 2013
After almost four years, Taddong’s expedition comes to an end…
Much like the four historic and meritable expeditions that went into the Challenger Deep reached their destination, today we announce that T...
Sunday, June 9, 2013
iStupid: Advanced Usage
This is a follow up of the original iStupid introduction and the iStupid setup & basic usage blog posts. The simplest way of launching...
Friday, May 31, 2013
iStupid: Setup & Basic Usage
iStupid , i ndescreet S SID t ool (for the) u nknown P NL (on) i OS d evices , is a Python-based tool for Linux that allows deleting Wi-Fi n...
One of the tools I demonstrated during the last RootedCON 2013 conference in Madrid as part of my " Wi-Fi: Why iOS (Android, and other...
Wednesday, April 17, 2013
How To Add Wi-Fi Networks To Mobile Devices?
One of the first things I learned during my recently published Wi-Fi security research is that mobile vendors do not read Taddong's Secu...
Monday, March 11, 2013
Wireshark SMB2 file extraction feature now available
Our SMB2 object exporting functionality has been included in the Wireshark development trunk from SVN rev. 48210 on. Source code and bin...
Wednesday, February 20, 2013
Wireshark SMB2 file extraction feature
Some time ago we contributed to Wireshark the SMB file extraction feature , which enabled the tool to extract a file (or portions of it) fro...
Friday, February 1, 2013
After more than one year since the previous TLSSLed version , we are happy to announce TLSSLed v1.3 ! This version is the result of testin...
Thursday, January 24, 2013
Apple's Skimpy Software Update Descriptions
UPDATE: January 28, 2013 Coincidentally, i OS 6.1 includes a security fix for a DoS Wi-Fi vulnerability (CVE-2012-2619) whose advisory wa...
Wednesday, November 7, 2012
Video: Owning a PC via GPRS/EDGE
We have decided to make public a video that we have used on several talks in the past, demonstrating a network attack against a PC, performe...
View web version