Attacks on any device have become increasingly complex: attackers often string together multiple vulnerabilities in a chain of attacks that can cause devastating effects by requiring little user interaction. The main goals of this post are essentially two: first, we will do a general overview of the various phases of a cyber kill-chain and the […]
BlueBorne kill-chain on Dockerized Android
Written by Angelo Delicato and Daniele Capone - 23 Sep 2021