| Errata Security – Robert Graham – Feb 21 – As discussed in my previous blogpost, it took about 3 hours to reverse engineer the Lenovo/Superfish certificate and crack the password. In this blog post, I described how I used that certificate in order to own victims using a rogue WiFi hotspot. | | | Nuzzel, Inc., 665 3rd St., Suite 150, San Francisco, CA 94107 | |
No hay comentarios.:
Publicar un comentario