Aggregator
The Rising IoT Threat to the Agriculture Industry and the Global Food Supply
Headwinds and Tailwinds - Cycling For Climate Awareness in a Global Pandemic
开源信息收集周报#57
开源信息收集周报#57
Write a simple HTTPS server use Go
BurpSuite插件:HaE - 信息高亮标记与提取
BurpSuite插件:HaE - 信息高亮标记与提取
BurpSuite插件:HaE - 信息高亮标记与提取
Machine Learning Attack Series: Smart brute forcing
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts. There are the two main sections of the series - more content will be added over time:
- Overview: How Husky AI was built, threat modeled and operationalized
- Attacks: The attacks I want to investigate, learn about, and try out
The previous post covered basic tests to trick the image recognition model. This included generating “bad” images with solid colors or entire random pixels.
物联网安全之MQTT渗透实战
上一篇 物联网安全之MQTT协议安全 主要介绍了MQTT安全的一些基础知识。今天将在上一篇基础上来说说实战中MQTT的利用。
在整个物联网或车联网架构中,MQTT的部分通常应用在移动端、管理端、Web端、设备端。而MQTT协议中的三种角色是发布者(PUBLISHER)、订阅者(SUBCRIBER)、代理(BROKER)。发布者(PUBLISHER)和订阅者(SUBCRIBER)通过代理(BROKER)来发布和订阅消息。这两个角色在实际场景中主要应用是移动端、Web端、设备端;代理(BROKER)一般是服务器,可以由activemq、hivemq、emqx等许多软件来搭建。在开发过程中,不同的设备,技术特点也有所不同。其使用的协议除了mqtt外,Web端通常使用websocket的方式来进行收发消息。
EMQ X Broker 场景 0x00 获取MQTT认证信息目前对于MQTT的开发中的安全还尚未受到广泛关注,这使得有多种方式在移动端、Web端、设备端获取到MQTT的认证与连接信息。通过获取的信息来进一步实现越权访问、发布恶意内容等攻击。