▲ | Liftyee 3 days ago | |
I'm working on exploring an exploit in physical security systems that I haven't seen anyone investigate before (at least, not published on the internet). It's involved an interesting combination of reverse engineering, pentesting and regular prototyping/hardware development. Currently writing a run-through of it to publish on my website. I'm not sure how secretive to be - I think I just want to be the first to actually release my findings. In my post I'll detail the steps to reproduce my results so more people can look into this. So far I haven't found any critical ways to (ab)use this access control system weakness, as it only typically applies to the outer layer of physical security. | ||
▲ | Blahah 3 days ago | parent [-] | |
What's your website? |