Reading time:
~21 min
Posted
by jeanpascal.thomas@orangecyberdefense.com
on
28 July 2023
For our annual internal hacker conference dubbed SenseCon in 2023, I decided to take a look at communication between a...
Reading time:
~7 min
Posted
by Emmanuel Cristofaro
on
23 November 2020
Ciao belli! On the 19th of November 2020, SONY finally released the new PlayStation 5 in the UK. A few...
Reading time:
~36 min
Posted
by Emmanuel Cristofaro
on
24 January 2020
Hacking PlayStation DualShock controllers to stream audio to their internal speakers. Ciao a tutti. Introduction I didn’t really know what...
Reading time:
~20 min
Posted
by Leon Jacobs
on
27 November 2019
Remember iddqd and idkfa? Those are two strings were etched into my brain at a very young age where fond...
Reading time:
~21 min
Posted
by saif
on
29 July 2017
Exploiting MS17-017 EoP Using Color Palettes This post is an accompaniment to the Defcon 25 talk given by Saif. One...
Reading time:
~8 min
Posted
by etienne
on
01 September 2016
History In December 2015 Silent Break Security wrote about “Malicious Outlook Rules” and using these to get a remote shell....
Reading time:
~4 min
Posted
by siavosh
on
17 January 2014
Aah, January, a month where resolutions usually flare out spectacularly before we get back to the couch in February. We’d...
Reading time:
~2 min
Posted
by behrang
on
13 December 2012
ASP.NET HttpHandlers are interesting components of a .NET web application when performing security assessments, mainly due to the fact they...
Reading time:
~1 min
Posted
by behrang
on
10 September 2012
Today’s smart cards such as banking cards and smart corporate badges are capable of running multiple tiny applications which are...
Reading time:
~4 min
Posted
by behrang
on
24 May 2012
There has been a healthy reaction to our initial post on our research into the RSA SecureID Software Token. A...
Reading time:
~7 min
Posted
by behrang
on
17 May 2012
Widespread use of smart phones by employees to perform work related activities has introduced the idea of using these devices...
Reading time:
~1 min
Posted
by saurabh
on
01 November 2011
This week, Charl van der Walt and I (Saurabh) spoke at Mobile Security Summit organized by IIR (http://www.iir.co.za/detail.php?e=2389). Charl was...
Reading time:
~7 min
Posted
by saurabh
on
24 October 2011
This blog post steps through how to convert encrypted iPhone application bundles into plaintext application bundles that are easier to...
Reading time:
~4 min
Posted
by behrang
on
25 October 2010
Introduction From time to time I like to delve into malware analysis as a pastime and post interesting examples, and...
Reading time:
~1 min
Posted
by behrang
on
05 March 2010
BackupExec agent is often among common services found on the internal pen tests. The agent software stores an encrypted “logon...
Reading time:
~1 min
Posted
by behrang
on
22 January 2009
I’ve developed a FTP like multi-threaded server application as a target for this challenge of the month. It has been...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
11 September 2008
Introducing [http://www.reddit.com/r/ReverseEngineering/]
(like its name suggests, a reddit thats all about Code RE..)
Reading time:
~1 min
Posted
by behrang
on
27 August 2008
APSB08-15 is the latest adobe security advisory regarding a memory corruption vulnerabilty in Acrobat Reader versions <8.1.2 As expected, the advisory...