【胖猴小玩闹】智能门锁与BLE设备安全Part 4: 耶鲁智能门锁的简单测试(下)
本篇文章中,我们将通过嗅探BLE通信获取到关键数据,从而控制门锁。
One question that I have gotten a few times about “Cybersecurity Attacks - Red Team Strategies” is around the conceptual attack graphs in “Chapter 3, Measuring an Offensive Security Program”. Specifically, how I create them.
In this post I will briefly go over some of the reasons for creating them, and also how I create them and share a template for others to use and adjust.
I’m not a graphic designer, so I’m sure there are better ways of doing this.