Defend the Airport

Defend the Airport

Every day, millions of passengers depend on a vast, complex airport ecosystem to get from Point A to Point B. From airline check-ins and baggage handling to air traffic control and terminal operations, the aviation sector is an intricate web of interconnected third-party providers, technologies, and stakeholders.
In this high-stakes environment, a cybersecurity breach is not a single point of failure, it’s a ripple effect waiting to happen.

Read More
Quest Accepted: Setting Up a Pentesting Environment for the Meta Quest 2

Quest Accepted: Setting Up a Pentesting Environment for the Meta Quest 2

With the advent of commercially available virtual reality headsets, such as the Meta Quest, the integration of virtual and augmented reality into our daily lives feels closer than ever before. As these devices become more common, so too will the need to secure and protect the data collected and stored by them.
The intention of this blog post is to establish a baseline security testing environment for Meta Quest 2 applications and is split into three sections: Enabling Developer Mode, Establishing an Intercepting Proxy, and Injecting Frida Gadget. The Quest 2 runs on a modified version of the Android Open Source Project (AOSP) in addition to proprietary software developed by Meta, allowing the adoption of many established Android testing methods.
 

Read More
X