cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

Security Note

Just some personal notes.

Show more
Advertising posts
215
Subscribers
No data24 hours
No data7 days
+630 days

Data loading in progress...

Subscriber growth rate

Data loading in progress...

https://github.com/wangtielei/POCs/blob/main/CVE-2024-27801/POC.m PoC of CVE-2024-27801, UAF in the low level implementation of NSXPC that has been present since the initial release of NSXPC (over decade ago) Video: https://x.com/CertiK/status/1800461903514239158 #ios #macOS #xpc
Show all...
POCs/CVE-2024-27801/POC.m at main · wangtielei/POCs

Contribute to wangtielei/POCs development by creating an account on GitHub.

Becoming any Android app via Zygote command injection (CVE-2024-31317) #Android https://rtx.meta.security/exploitation/2024/06/03/Android-Zygote-injection.html
Show all...
Becoming any Android app via Zygote command injection

We have discovered a vulnerability in Android that allows an attacker with the WRITE_SECURE_SETTINGS permission, which is held by the ADB shell and certain privileged apps, to execute arbitrary code as any app on a device. By doing so, they can read and write any app’s data, make use of per-app secrets and login tokens, change most system configuration, unenroll or bypass Mobile Device Management, and more. Our exploit involves no memory corruption, meaning it works unmodified on virtually any device running Android 9 or later, and persists across reboots.

https://www.optistream.io/blogs/tech/redteam-stories-1-soapy-xxe #soap #xxe #web Uncover and exploit XXE vulnerability in SOAP WS
Show all...
RedTeam Tales 0x1 - Soapy XXE

First in our series of redteam tales where we show exploitation of an error-based XXE within a SOAP web service during a client engagement.

https://forum.butian.net/share/3000 #iot #xiaomi #router 小米 AX9000 路由器 CVE-2023-26315 漏洞挖掘
Show all...
奇安信攻防社区-小米AX9000路由器CVE-2023-26315漏洞挖掘

https://www.ambionics.io/blog/iconv-cve-2024-2961-p1 #php #iconv ICONV, SET THE CHARSET TO RCE: EXPLOITING THE GLIBC TO HACK THE PHP ENGINE (PART 1)
Show all...
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)

A few months ago, I stumbled upon a 24 years old buffer overflow in the glibc, the base library for linux programs. Despite being reachable in multiple well-known libraries or executables, it proved rarely exploitable — while it didn't provide much leeway, it required hard-to-achieve preconditions. Looking for targets lead mainly to disappointment. On PHP however, the bug shone, and proved useful in exploiting its engine in two different ways.

Show all...
Writing our own Cheat Engine: Introduction | Lonami's Blog

Official Lonami's website

https://esp32-open-mac.be/posts/0005-the-road-ahead/ Reverse engineering ESP32 Wi-Fi driver: the road ahead #iot #RE
Show all...
Reverse engineering ESP32 Wi-Fi driver: the road ahead

Estimating the effort needed to re-implement the Wi-Fi driver

https://devco.re/blog/2024/05/24/pwn2own-toronto-2022-a-9-year-old-bug-in-mikrotik-routeros/ Pwn2Own Toronto 2022 : A 9-year-old bug in MikroTik RouterOS #pwn2own #iot #Vault7
Show all...
Pwn2Own Toronto 2022 : A 9-year-old bug in MikroTik RouterOS | DEVCORE 戴夫寇爾

DEVCORE 研究組在 Pwn2Own Toronto 2022 白帽駭客競賽期間,在 MikroTik 的路由器產品中,發現了存在九年之久的 WAN 端弱點,透過串連 Canon printer 的弱點,DEVCORE 成為史上第一個在 Pwn2Own 賽事中成功挑戰 SOHO Smashup 項目的隊伍;最終 DEVCORE 在 Pwn2Own Toronto 2022 奪下冠軍,並獲頒破解大師(Master of Pwn)的稱號。

https://a.exozy.me/posts/bad-apple-animated-qr-code/ #qrcode Bad Apple!! But It's An Animated QR Code of Bad Apple!! 使用动态二维码在离线环境中传输数据,速率高达 2Mb/s (比什么风扇震动侧信道窃取数据靠谱多了)
Show all...
Bad Apple!! But It's An Animated QR Code of Bad Apple!!

Final project for the MIT 6.8301 Computer Vision class

https://binary.ninja/2024/05/21/automatically-identifying-base-addresses.html #iot #binaryninja #RE Automatically Identify Base Addresses With Binary Ninja
Show all...
Binary Ninja - Automatically Identify Base Addresses With Binary Ninja

Binary Ninja is a modern reverse engineering platform with a scriptable and extensible decompiler.

Choose a Different Plan

Your current plan allows analytics for only 5 channels. To get more, please choose a different plan.