🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

📡 IoT Security

Security for Internet of Things devices

117
Contributors
98
Talks
18
Tool Demos
7
Panels
1
Awards

Top Contributors

Jatin Kataria(7) Aseem Jakhar(6) Rahul Sasi(6) Arun Mane(5) Saumil Shah(5)

Related Tags (19)

Show all 19 tags...

All Entries (124 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-04-04Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2025-04-03Tool demoBlackhat CompartIoT Source Code Sreesankar S, Aditya Krishna Vinod, Season Cherian#microcontrollers#hardware-embedded#firmware-analysis+2
2025-03-02TalkNullcon Building Glitch-Resistant Firmware: Practical Software Countermeasures for Hardware glitch attacks Presentation Shyam Kumar Arshid, Chinmay Krishna#embedded-security#firmware-analysis#secure-coding+1
2025-03-02PanelNullcon Tackling Automotive Hardware Vulnerabilities Aseem Jakhar, Sachin Jain, Adam Laurie#automotive-cybersecurity#embedded-systems#hardware-embedded+3
2024-12-12Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehri#genzai#iot-device-management#iot-pentesting+4
2024-11-21TalkSecurityfest Wheels of Wonder Video Hrishikesh Somchatwar#automotive-cybersecurity#car-hacking#embedded-systems+4
2024-11-21TalkDeepsec Hacking with Physics v2.0 Hrishikesh Somchatwar#ics-security#embedded-security#firmware-analysis+2
2024-08-10TalkDefcon Compromising an Electronic Logging Device and Creating a Truck2Truck Worm Presentation Rik Chatterjee, Jake Jepson#eld#embedded-systems#ics-security+3
2024-08-10PanelDefcon Color Blasted Badge Making: How Hard Could It Be ? Abhinav Panda, Hamster, Bradan Lane#hardware-embedded#embedded-systems#hardware-hacking
2024-08-07TalkBlackhat The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition Presentation Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi#hacking#embedded-systems#ctf
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2024-04-19Tool demoBlackhat GearGoat : Car Vulnerabilities Simulator Source Code Nishant Sharma, Pranjal Soni, Sanjeev Mahunta#car-hacking#iot-device-management#iot-pentesting+3
2024-04-19TalkBlackhat Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems Presentation Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay#embedded-security#firmware-analysis#architecture+1
2024-04-18Tool demoBlackhat Genzai - The IoT Security Toolkit Source Code Umair Nehri#iot-security-testing#iot-pentesting#device-security+1
2024-04-18TalkBlackhat The Hack@DAC Story: Learnings from Organizing the World’s Largest Hardware Hacking Competition Presentation Arun Kanuparthi, Hareesh Khattri, Jeyavijayan Jv Rajendran, Jason Fung, Ahmad Reza Sadeghi#hacking#embedded-systems#ctf+1
2024-03-11TalkNullcon Achilles Heel In Secure Boot: Breaking RSA Authentication And Bitstream Recovery From Zynq-7000 SoC Presentation Video Arpan Jati#vulnerability-assessment#embedded-systems#firmware-analysis
2023-09-23TalkNullcon Reverse Engineering RGB Keyboard Backlights With Linux Kernel Drivers Presentation Video Rishit Bansal#reverse-engineering#linux#firmware-analysis
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobe#automotive-cybersecurity#ics-security#embedded-systems+4
2023-08-10TalkDefcon Wheels of Wonder: Unveiling Car Hacking Poetry Presentation Video Hrishikesh Somchatwar#firmware-analysis#reverse-engineering#automotive-cybersecurity
2023-08-06TalkC0c0n A Secure Privacy-Preserving Lightweight Authentication Scheme for Internet of Medical Things Video Panchami V, Mahima Mary Mathews#authentication#data-protection#embedded-security
2023-05-12Tool demoBlackhat Introducing the Operating System for Automotive Security Testing: A Hands-on Demonstration Source Code Ravi Rajput#automobile#automotive-cybersecurity#embedded-systems+4
2023-05-11Tool demoBlackhat CANalyse 2.0 : A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2023-04-20TalkHitbsecconf BYPASSING ANTI-CHEATS & HACKING COMPETITIVE GAMES Presentation Video Rohan Aggarwal#hacking#hardware-hacking#bypassing+3
2022-09-24TalkC0c0n Introduction to RFID/NFC Hacking Davis Sojan#embedded-security#firmware-analysis#security-assessment+1
2022-09-23TalkC0c0n TropicTrooper : Targets high profile victims using newly discovered MQTT backdoor Saurabh Sharma, Noushin Shabab#reverse-engineering#security-assessment#iot-pentesting
2022-09-06PanelNullcon IoT Supply Chain Blues and the way forward Video Aseem Jakhar, Kedar Sovani, Anantharaman Iyer, Suvabrata Sinha, Sudarshan Rajagopal, Sachin Jain#iot-device-management#iot-pentesting#supply-chain-security+3
2022-08-11TalkBlackhat RollBack - A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems Presentation Whitepaper Soundarya Ramesh, Levente Csikor, Hoon Wei Lim, Jun Wen Wong, Rohini Poolat Parameswarath, Chan Mun Choon#automobile#automotive-cybersecurity#car-hacking+2
2022-08-10Tool demoBlackhat CANalyse (2.0): A vehicle network analysis and attack tool Source Code Kartheek Lade, Rahul Jeyasingh#automobile#car-hacking#iot-device-management+4
2022-05-18TalkCansecwest Launching EMUX - A framework for emulating ARM and MIPS IoT Devices Presentation Source Code Saumil Shah#firmware-analysis#reverse-engineering#embedded-security
2022-05-12TalkBlackhat Non-Intrusive Vulnerability Localization and Hotpatching for Industrial Control Systems Presentation Prashant Rajput, Michail Maniatakos#ics-security#control-systems#hardware-embedded+3
2022-03-25TalkInsomnihack Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems Video Nitin Lakshmanan, Sunil Kumar 1#bluetooth#hardware-embedded#iot-pentesting+4
2022-03-24TalkInsomnihack Practical exploitation of zigbee-class networks with USB-based RF transceivers & open source software Video Nitin Lakshmanan, Sunil Kumar 1#iot-pentesting#wireless-security#hardware-hacking+3
2021-11-19TalkHackfest Hacking with Physics Hrishikesh Somchatwar#ics-security#automotive-cybersecurity#embedded-systems+4
2021-11-18TalkHackinparis {Internet of Things or Threats}: Anatomizing the Structure of IoT Botnets Video Aditya K Sood#iot-pentesting#iot-security-testing#botnet
2021-11-12TalkC0c0n IoT Security Guidelines & Standards Yashodhan Vivek Mandke#embedded-security#iot-device-management#iot-security-testing+3
2021-08-06TalkDefcon Defending IoT in the Future of High-Tech Warfare Video Harshit Agrawal#iot-pentesting#architecture#ics-security
2021-08-05TalkBlackhat PCIe Device Attacks: Beyond DMA. Exploiting PCIe Switches, Messages and Errors Presentation Hareesh Khattri, Nagaraju N Kodalapura, Nam N Nguyen#hardware-embedded#endpoint-protection#incident-management+1
2021-05-07Tool demoBlackhat CANalyse: A Vehicle Network Analysis and Attack Tool Source Code Kartheek Lade#automobile#car-hacking#iot-device-management+4
2021-03-05TalkNullcon Arbitrary code execution on RISC-V using fault injection Video Praveen Vadnala, Nils Wiersma#code-analysis#hardware-embedded#embedded-systems+1
2021-03-05PanelNullcon CyberPhysical Systems Security - Trends, challenges & opportunities Video Frank Sanjay, Khushwant Pawar, Mayur Mehta, Faruk Kazi#industrial-control-systems#operational-technology#embedded-systems+3
2020-11-11TalkPowerofcommunity Arbitrary code execution on RISC-V using fault injection Praveen Vadnala, Nils Wiersma#fault-injection#embedded-security#firmware-analysis+1
2020-10-02TalkBlackhat Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale Presentation Whitepaper Video Aravind Machiry, Nilo Redini, Andrea Continella, Ruoyu Wang, Yan Shoshitaishvili, Cristopher Kruegel, Giovanni Vigna, Chad Spensky#embedded-systems#firmware-analysis#static-analysis+1
2020-10-01Tool demoBlackhat Wi-Fi Access Point Rootkits Nishant Sharma, Jeswin Mathai#wifi#blueteam#iot-pentesting+1
2020-09-18TalkC0c0n All about IOT Forensics Hima Bindu Vejella#forensics#iot-device-management#iot-pentesting+4
2020-09-18TalkC0c0n Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing Video Kaustubh Padwad#red-teaming#security-assessment#iot-device-management+4
2020-09-18TalkC0c0n Reverse Engineering Bare-Metal IoT Firmwares - Moving beyond Linux Munawwar Hussain Shelia#reverse-engineering#firmware-analysis#embedded-systems+4
2019-12-04TalkBlackhat Bring Your Own Token (BYOT) to Replace the Traditional Smartcards for Strong Authentication and Signing Presentation Whitepaper Video Karthik Ramasamy, Eric Hampshire#blueteam#smartcard#mfa+4
2019-11-09TalkToorcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Ang Cui#reverse-engineering#hardware-reverse-engineering#architecture+2
2019-10-16Tool demoHitbsecconf Introducing ARM-X - The ARM IoT Firmware Emulation Framework Presentation Source Code Video Saumil Shah#arm#linux#firmware-analysis+4
2019-10-11TalkTexascybersummit Exploit The State of Embedded Web Security in IoT Devices ! Aditya K Sood#iot-security-testing#web-security#embedded-security
2019-09-27TalkC0c0n Defense in Depth for Embedded Systems Presentation Jiggyasu Sharma#embedded-systems#blueteam#hardware-embedded+4
2019-09-23TalkRootcon Making Anomaly Detection system(ADS) for Vehicles (Automotive Hacking) Presentation Video Arun Mane, Nikhil Bogam#red-teaming#car-hacking#blueteam+1
2019-09-23TalkRootcon Hacking ICS devices/PLC’s for Fun - ICS and IOT Hacking Video Arun Mane#red-teaming#ics#ics-security+3
2019-08-09Award Thrangrycat - Pwnie Award for Most Under-Hyped Research Source Code Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#firmware-analysis+2
2019-08-09TalkDefcon 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Video Jatin Kataria, Rick Housley, Ang Cui#reverse-engineering#architecture#hardware-reverse-engineering+1
2019-08-09Tool demoDefcon Srujan: Safer Networks for Smart Homes Source Code Sanket Karpe, Parmanand Mishra#smart-devices#raspberry-pi#smart-homes
2019-08-08TalkBlackhat 100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans Presentation Video Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#exploit-delivery+3
2019-05-28TalkSecurityfest RF Exploitation: Demystifying IoT/OT hacks with SDR Video Himanshu Mehta, Harshit Agrawal#rf#iot-pentesting#operational-technology+1
2019-05-21TalkPhdays How to fail in hardware hacking Presentation Arun Magesh#red-teaming#embedded-systems#firmware-analysis+1
2019-05-21TalkPhdays Rapid hardware hacking 101 Arun Magesh#red-teaming#iot-pentesting#hardware-embedded+2
2019-05-10TalkHitbsecconf HAXPO: RF Exploitation: Demystifying IoT/OT Hacks with SDR Presentation Video Himanshu Mehta, Harshit Agrawal#rf#red-teaming#hardware-embedded+3
2019-05-09TalkHitbsecconf Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#firmware-analysis+1
2019-03-02PanelNullcon CISO Strategy for OT and IoT risk and Threat Management Video Gaurav Shukla, Gomeet Pant, Rakesh Viswanathan, Sudarshan Rajagopal#ics-security#iot-pentesting#cybersecurity-strategy+3
2019-02-28TalkNullcon Building Hardened IoT Implementations with LangSec Video Prashant Anantharaman#blueteam#secure-development#input-validation+4
2018-11-08TalkDefcamp Backdooring DVR/NVR devices Video Arun Mane#hardware-reverse-engineering#embedded-security#security-assessment+2
2018-11-02TalkHackfest Exploiting Connected Medical Devices: Lessons Learned & Data Earned Video Saurabh Harit#red-teaming#wearables#iot-device-management+4
2018-10-15TalkHacklu Make ARM Shellcode Great Again Presentation Saumil Shah#arm#embedded-systems#firmware-analysis
2018-10-05TalkC0c0n Cybersecurity Embedded Digital Transformation - The Future Sunil Kanchi#embedded-security#architecture#ics-security
2018-09-27TalkRootcon Expl-iot: Hacking IoT like a boss Presentation Video Aseem Jakhar#red-teaming#iot-security-testing#firmware-analysis+2
2018-09-12Talk44con Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#security-tools+3
2018-08-11Tool demoDefcon HealthyPi—Connected Health Source Code Ashwin Whitchurch#raspberry-pi#hardware-embedded#embedded-systems+4
2018-08-08Tool demoBlackhat V2X Validation Tool Source Code Raashid Ansari, Jonathan Petit#security-assessment#automobile#red-teaming
2018-08-08Tool demoBlackhat DARWIN: Real World Use Cases for Covert Wireless Arun Mane, Rushikesh D Nandedkar#wifi#ieee802.15.4#embedded-systems
2018-07-21TalkHope Evidential Study of IoT Botnets - The Bad and The Ugly! Video Aditya K Sood#botnet#iot-security-testing#malware-research
2018-03-03PanelNullcon IoT : How long till D Day? Video Aseem Jakhar, Shobha Jagathpal, Rishikesh Kamat, Daniel Cisowski, Michael Pyle#iot-device-management#iot-pentesting#embedded-systems+3
2017-12-06TalkBlackhat BREAKING BAD: STEALING PATIENT DATA THROUGH MEDICAL DEVICES Presentation Video Saurabh Harit#red-teaming#data-leak#identity-theft+1
2017-11-14TalkBlackhat Pwning a Smart Home in Under 10 Minutes Presentation Aditya Gupta#iot-pentesting#embedded-security#security-assessment+2
2017-10-05TalkVirusbulletin The router of all evil: more than just default passwords and silly scripts Presentation Whitepaper Video Himanshu Anand, Chastine Menrige#reverse-engineering#security-assessment#firmware-analysis
2017-08-18TalkC0c0n Hacking Homes: A hardware insight for IoT [in]Security Jiggyasu Sharma#red-teaming#hardware-embedded#firmware-analysis+2
2017-08-18TalkC0c0n The Internet Of Things: Essentials of Secur(IOT)y Arpit Bajpai, Ronald Michael#blueteam#iot-device-management#iot-pentesting+4
2017-08-18TalkC0c0n CoAP versus MQTT: IoT Protocol Vulnerability analysis Rajiv Pandey#security-assessment#iot-pentesting#embedded-systems+1
2017-08-18TalkC0c0n Exploiting the smartness of BLE Stack Apoorva Gupta#bluetooth#red-teaming#mobile-hacking+3
2017-08-17TalkUsenix BootStomp: On the Security of Bootloaders in Mobile Devices Presentation Whitepaper Video Aravind Machiry, Dipanjan Das, Nilo Redini, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvali, Christopher Kruegel, Giovanni Vigna#firmware-analysis#embedded-security#binary-analysis+1
2017-08-04TalkSha Attacking OpenSSL using Side-channel Attacks: The RSA case study Whitepaper Video Praveen Vadnala, Lukasz Chmielewski#reverse-engineering#architecture#embedded-security
2017-07-29Tool demoDefcon WiMonitor - an OpenWRT package for remote WiFi sniffing Vivek Ramachandran, Nishant Sharma, Ashish Bhangale#openwrt#red-teaming#sniffing+1
2017-07-27TalkDefcon ICS Humla Presentation Video Sneha Rajguru, Arun Mane#ics-security#security-assessment#embedded-systems+4
2017-06-24TalkLehack When encryption is not enough: Attacking Wearable - Mobile communication over BLE Presentation Video Sumanth Naropanth, Eliza Chelleng, Kavya Racharla#bluetooth#device-security#encryption+3
2017-04-14TalkHitbsecconf COMMSEC: IoT Hacking Simplified Presentation Source Code Video Aseem Jakhar#red-teaming#iot-pentesting#hardware-embedded+2
2017-03-03TalkNullcon Case Study on RFID (proximity cards) hacking Presentation Sarwar Jahan, Ashwath Kumar#rfid#red-teaming#hardware-embedded+4
2017-03-03PanelNullcon Hardware Security: Foundational Block of Cyber Battlefield Vinayak Godse, Amit Sharma, Aseem Jakhar, Minatee Mishra#hardware-embedded#firmware-analysis#embedded-systems+4
2017-02-14TalkRsac Side-Channel Resistant Implementations Praveen Vadnala#side-channel-attacks#embedded-security#encryption
2016-11-04Tool demoBlackhat Firmware Analysis Toolkit (FAT) Source Code Aditya Gupta#firmware#security-assessment#embedded-systems+3
2016-08-19TalkC0c0n Attacking and crashing IOT devices via Bluetooth LE Protocol Presentation Pratap Chandra Allena, Ajay Pratap Singh#bluetooth#red-teaming#iot-pentesting+2
2016-08-19TalkC0c0n Threats in Connected World Presentation Bhavin Gandhi#iot-pentesting#device-security#threat-landscape
2016-08-05TalkDefcon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2016-06-18TalkRecon A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Presentation Video Jatin Kataria, Ang Cui, Francois Charbonneau#reverse-engineering#hardware-reverse-engineering#firmware-analysis+2
2015-11-05TalkGroundzerosummit Hacking RFIDs under 2000INR Jayesh Chauhan#rfid#red-teaming#hardware-embedded+4
2015-11-05TalkGroundzerosummit Sanctioned to Hack: Your SCADA HMIs Belong to Us! Aditya K Sood#ics-security#web-security#firmware-analysis+2
2015-11-05TalkGroundzerosummit Cyber Security in Hospitals:Hospitals Under Seige Anirudh Duggal#hl7#data-protection#incident-management
2015-08-01TalkC0c0n From AOSP ( Android OpenSource Project ) to ABD ( Android Based Devices ) Anto Joseph#android#mobile-device-management#embedded-systems+2
2015-08-01TalkC0c0n Hacking RFIDs under 2000 INR Jayesh Chauhan, Divya S John#rfid#hardware-embedded#embedded-systems+3
2015-08-01TalkC0c0n Reversing and Deciphering the Cyber Espionage Malware Communications Monnappa K A#reverse-engineering#decipher#malware-research+3
2015-02-06TalkNullcon Drone Attacks: How I hijacked a drone Presentation Video Rahul Sasi#red-teaming#drone#gps+2
2014-11-13TalkGroundzerosummit Security vulnerabilities in DVB-C networks: Hacking Cable TV network Rahul Sasi#red-teaming#dvb-c#network-pentesting
2014-11-13TalkGroundzerosummit Hacking consumer electronics for Fun Atul Alex#red-teaming#embedded-systems#firmware-analysis+1
2014-11-13TalkGroundzerosummit SCADA Exploitation through Firmware Ashish Saxena#red-teaming#firmware-analysis#ics-security+3
2014-10-29TalkEkoparty Security vulnerabilities in DVB-C networks: Hacking Cable tV network part 2 Presentation Video Rahul Sasi#red-teaming#dvb-c#firmware-analysis+1
2014-05-29TalkHitbsecconf Hacking Your Cable TV Network: Die Hard Style Presentation Rahul Sasi#red-teaming#iptv#reverse-engineering
2014-03-18TalkTroopers Evolution of SIM Card Security Presentation Ravishankar Borgaonkar#3gpp#gsma#embedded-systems+4
2014-02-14TalkNullcon Null Hardware Badge 101 (Desi Jugaad) Presentation Video Amey Gat, Umesh#microcontrollers#embedded-systems#hardware-embedded
2014-02-14TalkNullcon Hacking YOu’r Cable TV Network. Video Rahul Sasi, Ahamed Nafeez#red-teaming#network-pentesting#endpoint-protection+1
2013-11-07TalkGroundzerosummit Serial killing of embedded systems Atul Alex#embedded-systems#hardware-embedded#firmware-analysis+1
2013-03-07TalkCansecwest SMS to Meterpreter - Fuzzing USB Modems Presentation Whitepaper Rahul Sasi#red-teaming#fuzzing#hardware-embedded
2012-12-01TalkClubhack Stand Close to Me, & You’re pwned! : Owning SmartPhones using NFC Presentation Video Aditya Gupta, Subho Halder#nfc#red-teaming#android-security+4
2012-11-23TalkMalcon Tampering in Energy Meters Presentation Mohit Arora#energy-theft#embedded-systems#firmware-analysis+2
2012-02-15TalkNullcon Open source revolution :Need Hardware - Software marriage Venkatesh#embedded-systems#hardware-embedded#open-source-security
2012-02-15TalkNullcon Teensy for fun and jugaad Amey Gat#microcontrollers#embedded-systems#hid
2011-12-15TalkBlackhat Kautilya: Teensy Beyond Shell Presentation Whitepaper Source Code Nikhil Mittal#hid#red-teaming#endpoint-protection+3
2011-08-03TalkBlackhat Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS Presentation Whitepaper Video Jatin Kataria, Ang Cui, Salvatore Stolfo#cisco-ios#hardware-embedded#firmware-analysis+4
2011-08-03TalkBlackhat Femtocells: A poisonous needle in the operator’s hay stack Presentation Whitepaper Video Ravishankar Borgaonkar, Nico Golde, Kevin Redon#network-pentesting#identity-theft#firmware-analysis
2011-02-25TalkNullcon Security Analysis of India’s Electronic Voting Machines: Memoirs of a whistleblower Presentation Video Hari Krishna Prasad Vemuru#evm#red-teaming#hardware-embedded+3
2010-10-29TalkT2 Hacking Femtocells Presentation Ravishankar Borgaonkar, Kevin Redon#reverse-engineering#device-security#hardware-embedded+3
2009-12-05TalkClubhack Indian IT Act 2000 vs 2009 Presentation Rohas Nagpal#cyber-law#embedded-systems#firmware-analysis+4
2009-11-17TalkSecuritybyte Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors Presentation Source Code Nitin Kumar, Vipin Kumar#windows#red-teaming#boot-sector+1