Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Major Vulnerabilities in Foscam Cameras- 58

VdooPosted 6 Years Ago
  • To start with, an API can be abused to delete arbitrary files. This is done by a classic directory traversal (../).
  • Stack based buffer overflow done by the concatenating of two strings :) Interesting never heard of this one before!
  • OS command injection in the administrative features via a server configuration.
  • Overall, a great article that goes into VERY deep technical details about the vulnerabilities!