RE The devil entered the stage! This is a write-up for solving the devils-swapper RE challenge. It was mostly intended for my personal archive but since it may be interesting to all of you. This especially 0xricksanchez 3 Feb 2021 · 17 min read
Hardware LinkSys EA6100 AC1200 - Part 1 - PCB reversing It has been a while since I did some hardware hacking and this time I want to review the basics. The LinkSys EA6100 router intrigued me due to the fact 0xricksanchez 11 Jan 2021 · 7 min read
Hardware Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2 Welcome back to part 2.2 of this series! If you have not yet checked out part 1 or part 2.1 please do so first as they highlight important 0xricksanchez 15 Jul 2020 · 29 min read
Hardware Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1 Welcome back to part 2 of this series! If you have not checked out part 1 yet please do so first as it highlights important reconnaissance steps! So let us 0xricksanchez 14 Jul 2020 · 14 min read
Hardware Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1 Recently we came across some firmware samples from D-Link routers that we were unable to unpack properly. Luckily we got our hands on an older, cheaper but similar device (DIR882) 0xricksanchez 13 Jul 2020 · 9 min read
RE What's a bitbang? Note: This is a re-upload of an old write-up. This is another write-up from an interesting little challenge. The original forum post about it can be found here. To get 0xricksanchez 12 Jul 2020 · 7 min read
RE Welcome to the Poly Bomb 💣 Note: Re-write/Re-upload due to dead links This write up are my thoughts and steps to statically analyze a given unknown binary. I want to understand the binary to a 0xricksanchez 10 Jul 2020 · 10 min read
RE Reversing and Exploiting Dr. von Noizemans Nuclear Bomb Note: Re-upload due to dead links :) Yo! Life kept me more than busy, but now I've got a little more time on my hands. I decided to do a write 0xricksanchez 10 Jul 2020 · 12 min read
Exploitation A very brief introduction to Control Flow Graphs and Control Flow Integrity Note: Re-Upload It has been a longer time since I tackled the exploit mitigations on Linux. Nevertheless I felt like I should at least cover control flow graphs and control 0xricksanchez 5 May 2020 · 7 min read
Exploitation Exploit Mitigation Techniques - Part 3 - Address Space Layout Randomization (ASLR) PrefaceHey there! I'm finally ready to present you the third installment of the series exploit mitigation techniques. The last two times we talked about Data Execution Prevention and Stack Canaries. 0xricksanchez 4 May 2020 · 27 min read
Exploitation Exploit Mitigation Techniques - Part 2 - Stack Canaries PrefaceHey there! After quite some time the second part will be finally published :) ! Sorry for the delay, real life can be overwhelming.. Last time I have introduced this series by 0xricksanchez 4 May 2020 · 18 min read
Exploitation Exploit Mitigation Techniques - Part 1 - Data Execution Prevention (DEP) PrefaceWelcome to a new series about GNU/Linux exploit mitigation techniques. I want to shift the focus to the bypassed techniques to create a series about currently deployed approaches. Afterwards, 0xricksanchez 4 May 2020 · 12 min read