Yogesh Ojha | Cyber Security | IoT
  • Home
  • Talks
  • Works
  • $ whoami
IoTIoT Security

IoT Security for Developers and Threat modeling for IoT – Open Source Summit + Embedded Linux Conference North America Slides

This week I spoke at Open Source Summit + Embedded Linux Conference NA on IoT security. This…

461
developmentproductivity

Productivity for front-end developers using Emmet

This is a part of PR that I submitted at https://github.com/LeCoupa/awesome-cheatsheets/blob/master/tools/emmet.md Introduction Emmet is a productivity toolkit…

493
car-hackingreverse engineering

Car Hacking 101: Practical Guide to Exploiting CAN-Bus using Instrument Cluster Simulator - Part III: SavvyCAN, Fuzzing CAN Frame and playing around with CAN frames

It’s been a while since I wrote on Car hacking using Instrument Cluster Simulator. I had promised…

847
car-hackingreverse engineering

Car Hacking 101: Practical Guide to Exploiting CAN-Bus using Instrument Cluster Simulator — Part II: Exploitation

This article assumes that you have already gone through Part I of setting up the Instrument Cluster….

760
car-hackingreverse engineering

Car Hacking 101: Practical Guide to Exploiting CAN-Bus using Instrument Cluster Simulator — Part I: Setting Up

Automotive security is really exciting and is an interesting topic of study for many security researchers. Automotive…

691
computer visionmachine learning

Self Driving Cars— a Beginners guide to Computer Vision — Finding Simple Lane Lines using Python and OpenCV

The Automotive industry is currently experiencing a paradigm shift from conventional human-driven vehicles to autonomous self-driving vehicles….

493
reverse engineering

Reverse Engineering WannaCry Ransomware using Ghidra — Finding the KillSwitch

Rob Joyce, a Senior Advisor to the National Security Agency (NSA) announced the public release of a software reverse…

554
machine learning

A Beginners Guide to Machine Learning — Data Preprocessing

Machine learning is right now the hottest thing. Every business wants to deploy a machine learning model…

473
IoT SecurityMi Band Hacking

I hacked MiBand 3, and here is how I did it Part II — Reverse Engineering to upload Firmware and Resources Over the Air

A while ago I posted an article on how I reverse engineered a BLE Fitness Tracker to…

1248
IoT SecurityMi Band Hacking

I hacked MiBand 3, and here is how I did it. Part I

I recently started getting excited about IoT Security and making devices behave differently than what they were…

1073
Page 1 of 1