Low-level adventures
  • Home
  • About
  • Contact
  • Publications
Log in Subscribe
Subscribe
  • Home
  • About
  • Contact
  • Publications
The devil entered the stage!
RE

The devil entered the stage!

This is a write-up for solving the devils-swapper RE challenge.‌‌ It was mostly intended for my personal archive but since it may be interesting to all of you. This especially

  • Go to the profile of  0xricksanchez
0xricksanchez
3 Feb 2021 · 17 min read
LinkSys EA6100 AC1200 - Part 1 - PCB reversing
Hardware

LinkSys EA6100 AC1200 - Part 1 - PCB reversing

It has been a while since I did some hardware hacking and this time I want to review the basics. The LinkSys EA6100 router intrigued me due to the fact

  • Go to the profile of  0xricksanchez
0xricksanchez
11 Jan 2021 · 7 min read
Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2
Hardware

Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2

Welcome back to part 2.2 of this series! If you have not yet checked out part 1 or part 2.1 please do so first as they highlight important

  • Go to the profile of  0xricksanchez
0xricksanchez
15 Jul 2020 · 29 min read
Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1
Hardware

Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1

Welcome back to part 2 of this series! If you have not checked out part 1 yet please do so first as it highlights important reconnaissance steps! So let us

  • Go to the profile of  0xricksanchez
0xricksanchez
14 Jul 2020 · 14 min read
Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1
Hardware

Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1

Recently we came across some firmware samples from D-Link routers that we were unable to unpack properly. Luckily we got our hands on an older, cheaper but similar device (DIR882)

  • Go to the profile of  0xricksanchez
0xricksanchez
13 Jul 2020 · 9 min read
What's a bitbang?
RE

What's a bitbang?

Note: This is a re-upload of an old write-up. This is another write-up from an interesting little challenge. The original forum post about it can be found here. To get

  • Go to the profile of  0xricksanchez
0xricksanchez
12 Jul 2020 · 7 min read
Welcome to the Poly Bomb 💣
RE

Welcome to the Poly Bomb 💣

Note: Re-write/Re-upload due to dead links This write up are my thoughts and steps to statically analyze a given unknown binary. I want to understand the binary to a

  • Go to the profile of  0xricksanchez
0xricksanchez
10 Jul 2020 · 10 min read
Reversing and Exploiting Dr. von Noizemans Nuclear Bomb
RE

Reversing and Exploiting Dr. von Noizemans Nuclear Bomb

Note: Re-upload due to dead links :) Yo! Life kept me more than busy, but now I've got a little more time on my hands. I decided to do a write

  • Go to the profile of  0xricksanchez
0xricksanchez
10 Jul 2020 · 12 min read
A very brief introduction to Control Flow Graphs and  Control Flow Integrity
Exploitation

A very brief introduction to Control Flow Graphs and Control Flow Integrity

Note: Re-Upload It has been a longer time since I tackled the exploit mitigations on Linux. Nevertheless I felt like I should at least cover control flow graphs and control

  • Go to the profile of  0xricksanchez
0xricksanchez
5 May 2020 · 7 min read
Exploit Mitigation Techniques - Part 2 -  Stack Canaries
Exploitation

Exploit Mitigation Techniques - Part 2 - Stack Canaries

PrefaceHey there! After quite some time the second part will be finally published :) ! Sorry for the delay, real life can be overwhelming.. Last time I have introduced this series by

  • Go to the profile of  0xricksanchez
0xricksanchez
4 May 2020 · 18 min read
Exploit Mitigation Techniques - Part 3 - Address Space Layout Randomization (ASLR)
Exploitation

Exploit Mitigation Techniques - Part 3 - Address Space Layout Randomization (ASLR)

PrefaceHey there! I'm finally ready to present you the third installment of the series exploit mitigation techniques. The last two times we talked about Data Execution Prevention and Stack Canaries.

  • Go to the profile of  0xricksanchez
0xricksanchez
4 May 2020 · 27 min read
Exploit Mitigation Techniques - Part 1 -  Data Execution Prevention (DEP)
Exploitation

Exploit Mitigation Techniques - Part 1 - Data Execution Prevention (DEP)

PrefaceWelcome to a new series about GNU/Linux exploit mitigation techniques. I want to shift the focus to the bypassed techniques to create a series about currently deployed approaches. Afterwards,

  • Go to the profile of  0xricksanchez
0xricksanchez
4 May 2020 · 12 min read
Dissecting and exploiting ELF files
General

Dissecting and exploiting ELF files

  • Go to the profile of  0xricksanchez
0xricksanchez
4 May 2020 · 27 min read
Fuzzing projects with american fuzzy lop (AFL)
Fuzzing

Fuzzing projects with american fuzzy lop (AFL)

  • Go to the profile of  0xricksanchez
0xricksanchez
4 May 2020 · 10 min read
An introduction to printer exploitation
Exploitation

An introduction to printer exploitation

  • Go to the profile of  0xricksanchez
0xricksanchez
4 May 2020 · 9 min read
© 2021 Low-level adventures. All rights reserved.
Design with by @GodoFredoNinja
No results found
↑ ↓ Navigate up/down
Enter Go to article
Esc Close search
github