Step-by-step walkthrough of identifying UART pins on a consumer IoT gateway, dumping the firmware, and extracting credentials from the filesystem.
Blog
Penetration testing research, techniques, and writeups across web, network, IoT, mobile, and phishing.
How we chained a blind SSRF vulnerability with an IDOR in a SaaS platform's internal API to read files belonging to arbitrary tenants — and collected a $25,000 bug bounty.
Full walkthrough of a real internal engagement — LLMNR poisoning for initial creds, Kerberoasting for a service account, and DCSync for the keys to the kingdom.
How to design, execute, and debrief a phishing simulation campaign that measurably improves security awareness — without destroying trust or demoralising your team.
Updated guide to defeating certificate pinning in Android apps — covering OkHttp, Conscrypt, and custom pinning implementations — using Frida scripts in 2026.