<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Gerboise</title><link>/categories/security/</link><description>Recent content in Security on Gerboise</description><generator>Hugo</generator><language>en</language><copyright>Gerboise</copyright><lastBuildDate>Mon, 16 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="/categories/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Beeper 1: Reverse Engineering a Hidden Command</title><link>/blog/beeper-1-reverse-engineering-a-hidden-command/</link><pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate><guid>/blog/beeper-1-reverse-engineering-a-hidden-command/</guid><description>Reverse engineering a Zephyr firmware to find a hidden XOR-obfuscated command in a Ph0wn CTF challenge</description></item><item><title>Beeper 2: Crafting an OOK Radio Signal to Trigger a Hidden Command</title><link>/blog/beeper-2-crafting-an-ook-radio-signal-to-trigger-a-hidden-command/</link><pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate><guid>/blog/beeper-2-crafting-an-ook-radio-signal-to-trigger-a-hidden-command/</guid><description>Crafting and transmitting a 433 MHz OOK signal with a BladeRF to trigger a hidden command on a real device</description></item></channel></rss>