Training

Practical DevOps Security and Exploitation training

We are proud to announce that Attify will be conducting a 2-day hands-on training class on DevOps security and exploitation. This is one of our new offerings resulting from our...

Offensive IoT Exploitation training – Q4 2017

If you have been wanting to learn IoT Exploitation but never got a chance, here’s something that you’ll be interested in. It’s the end of the year and we have a couple of...

Bypass Jailbreak Detection with Frida in iOS applications

In this blog post, we will have a look at Frida, which is one of the really interesting tools for mobile application security analysis. This is also something we cover in-depth in...

Zigbee security and exploitation for IoT devices

While working on our training material for the Offensive IoT Exploitation course, we here at Attify did a ton of in-depth research into all the possible aspects of IoT devices....

Introduction to Attify Badge : Hacking IoT hardware

Welcome to the new blog post by Attify. In this blog post, we will introduce our newest creation – Attify Badge, something which we use in order to perform hardware...

Emulating and Exploiting Firmware binaries

Welcome to the third post in the “Offensive IoT Exploitation” series. In the previous one, we learned about how we can get started with analyzing firmware and extracting file...

Firmware Analysis for IoT Devices

This is the second post in the IoT Exploitation and Penetration Testing series. In this post, we are going to have a look at a key component in an IoT device architecture –...

Getting started with “IoT Security” – Mapping the attack surface

IoT or the Internet of Things is the new buzzword all around. However, not enough attention has been paid to the security aspect of these so-called “smart” devices. This...

BlackHat Asia 2016 : Wrap Up

Like almost any other major security conference, this time at BlackHat Asia 2016 , Attify was present to interact with its existing clients and also to conduct a security...

3 Steps to Secure your IoT Devices from getting HACKED.

A lot of new IoT  ( Internet of Things ) and smart  devices are coming up every now and then, and being a user myself, I thought a few  basic and handy tips will be useful to...