Full Disclosure mailing list archives
Perverting Embedded Devices - ZKSoftware Fingerprint Reader (Part I)
From: Francisco Amato <famato () infobytesec com>
Date: Fri, 8 Aug 2014 17:31:26 -0300
Hi list, I would like to share the following blog post about ZKSoftware Fingerprint Reader vulnerabilities: *http://blog.infobytesec.com/2014/07/perverting-embedded-devices-zksoftware_2920.html <http://blog.infobytesec.com/2014/07/perverting-embedded-devices-zksoftware_2920.html>* Best -- FRANCISCO AMATO Chief Executive Officer Infobyte LLC Linkedin: http://www.linkedin.com/in/famato Twitter: http://twitter.com/famato HQ +1 305 851 3373 2699 S. Bayshore Dr #300. [33133], Miami, FL <http://www.linkedin.com/company/infobyte-security-research> <https://twitter.com/infobytesec> <https://www.facebook.com/Infobytesec> <http://blog.infobytesec.com/> <http://www.infobytesec.com/> Know about *Faraday*, our multiuser Penetration test IDE. *Click here.* <http://www.faradaysec.com/> _______________________ CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is being sent by Infobyte for the sole use of the intended recipient(s) and may contain confidential, proprietary and/or privileged information. Any unauthorized review, use, disclosure and/or distribution by any recipient is prohibited. If you are not the intended recipient, please delete and/or destroy all copies of this message regardless of form and any included attachments and notify Infobyte immediately by contacting the sender via reply e-mail or forwarding to Infobyte at infox () infobytesec com. _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Current thread:
- Perverting Embedded Devices - ZKSoftware Fingerprint Reader (Part I) Francisco Amato (Aug 12)