The Art of Reverse Engineering: Uncovering IoT Network Security Vulnerabilities
Discover the power of reverse engineering to uncover IoT network security flaws and improve overall system security.
![An image of a security professional examining the inner workings of an IoT device, with various hardware components and circuit boards visible.](https://simeononsecurity.com/img/cover/an_image_of_a_security_professional_examining_the_inner_workings_240x137.webp)
What SimeonOnSecurity learned about and found interesting today
SimeonOnSecurity recently learned about two topics in the field of computer security: CVE-2020-17049, also known as the Kerberos Bronze Bit Attack, and Windows Token-Based Activation.
The Kerberos Bronze Bit Attack, as explained in a series of blog posts by Netspi and in a post by Trimarcsecurity, is a vulnerability in the Kerberos authentication protocol. This vulnerability could potentially allow an attacker to compromise an Active Directory, which is a central repository for information about an organization’s users, computers, and other resources. The deployment of Kerberos S4U changes to address this vulnerability is discussed in a Microsoft support article.