Ivan Glinkin’s Post

View profile for Ivan Glinkin, graphic

Russian hacker 🇷🇺

Hardware hacking: Wireless doorbell payload harvesting Cybersecurity from the offensive perspective is not only related to web-applications and Active directory attacks. There are a lot of hacking areas beside mentioned ones: mobile, API, operational technology (OT), and wireless attack simulations; binary exploitation, social engineering, red teaming and many more other. One of the toughest one, from my point of view, is hardware hacking, when you are communicating directly with the layer 1 of OSI model – physical. If you are excited as much as I am to disassemble some devices – let’s not waste any second and dig into learning together - let's hack the wireless doorbell😉 Article link -> https://lnkd.in/dahZbrFT Hashtags -> #hardware #hacking #doorbell #hardwarehacking #raspberry

Emran H.

CS @ Georgia State | Cyber Threat Analyst Intern @ Southern Company | Prev. Cybersecurity Mentee @ CrowdStrike | CompTIA A , Network , Security | CodePath Tech Fellow

7mo

Thanks for sharing this, Ivan. Definitely will be showing this off to my university's cybersecurity club.

Ronen Kalimyan, CISSP

Roald Nefs

Security Specialist | Helping organisations run secure and reliable systems at scale

2mo

While hardware hacking may not be the easiest area to start with, it remains a largely unexplored field. Security issues found in hardware often persist because it’s much harder for vendors to update existing hardware or firmware compared to software. This makes hardware hacking a unique and impactful area to dive into, where your discoveries can have long-lasting significance.

Samia Aslam

Linux | Cyber Security | Python | SQL | Ethical Hacking | Bug Bounty | API | Freelancer | Translator | Korean to English Translator | Subtitler

7mo

Even the DOORBELL is hackabale ????!!!

Like
Reply
Zuhaib Khurshid (CISSP, CISM)

🔸LinkedIn Top Voice | Certified Information Security Manager @ IP Technology LLC | Cybersecurity Engineer/Consultant/Trainer

7mo
Like
Reply
See more comments

To view or add a comment, sign in

Explore topics