Fuzzing The State of Go Fuzzing - Did we already reach the peak? During one of the recent working days, I was tasked with fuzzing some Go applications. That's something I had not done in a By 0x434b 15 May 2024
Exploitation Learning Linux kernel exploitation - Part 2 - CVE-2022-0847 Continuing to walk down Linux Kernel exploitation lane. This time around with an unanticipated topic: DirtyPipe as it actually nicely fits the series as an example. By 0x434b 9 May 2022
Exploitation Learning Linux kernel exploitation - Part 1 - Laying the groundwork Table fo contents Disclaimer: This post will cover basic steps to accomplish a privilege escalation based on a vulnerable driver. The basis for this introduction By 0x434b 1 Mar 2022
Overview of GLIBC heap exploitation techniques Overview of current GLIBC heap exploitation techniques up to GLIBC 2.34, including their ideas and introduced mitigations along the way By 0x434b 13 Feb 2022
General MISC study notes about ARM AArch64 Assembly and the ARM Trusted Execution Environment (TEE) Disclaimer: These are unfiltered study notes mostly for myself. Guaranteed not to be error free. So if you did land here, managed to get to By 0x434b 12 Feb 2022
Hardware LinkSys EA6100 AC1200 - Part 2 - A serial connection FTW! Last time we left off with a pretty decent understanding about how our router is structured and what components were used. We also found two By 0x434b 5 Nov 2021
RE The devil entered the stage! This is a write-up for solving the devils-swapper RE challenge. It was mostly intended for my personal archive, but since it may be interesting to By 0x434b 3 Feb 2021
Hardware LinkSys EA6100 AC1200 - Part 1 - PCB reversing It has been a while since I did some hardware hacking, and this time I want to review the basics. The LinkSys EA6100 router intrigued By 0x434b 11 Jan 2021
Hardware Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2 Welcome back to part 2.2 of this series! If you have not yet checked out part 1 or part 2.1, please do so By 0x434b 15 Jul 2020
Hardware Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1 Welcome back to part 2 of this series! If you have not checked out part 1 yet, please do so first, as it highlights important By 0x434b 14 Jul 2020
Hardware Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1 Recently, we came across some firmware samples from D-Link routers that we were unable to unpack properly. Luckily, we got our hands on an older, By 0x434b 13 Jul 2020
RE What's a bitbang? Note: This is a re-upload of an old write-up. This is another write-up from an interesting little challenge. The original forum post about it can By 0x434b 12 Jul 2020
RE Welcome to the Poly Bomb 💣 Note: Re-write/Re-upload due to dead links This write up are my thoughts and steps to statically analyze a given unknown binary. I want to By 0x434b 10 Jul 2020
RE Reversing and Exploiting Dr. von Noizemans Nuclear Bomb Note: Re-upload due to dead links :) Yo! Life kept me more than busy, but now I've got a little more time on my By 0x434b 10 Jul 2020
Exploitation Exploit Mitigation Techniques - Part 2 - Stack Canaries Preface Hey there! After quite some time the second part will be finally published :) ! Sorry for the delay, real life can be overwhelming.. Last time By 0x434b 4 May 2020