By Matt October 02, 2024
This post provides an overview of Talkback Chronicles for viewing snapshots of trending infosec resources for points in time, and also how to subscribe to a new weekly Newsletter feature.
By daniel August 01, 2024
This blog post covers a DUCTF 2024 pwn challenge called "ESPecially Secure Boot", which required writing an exploit for CVE-2018-18558.
By Alex Brown July 08, 2024
Part two of our ORM Leak series about attacking the Prisma ORM and leaking sensitive data in a time-based attack.
By Alex Brown June 23, 2024
This blog article explains what are ORM Leak vulnerabilities, how they could be exploited to access sensitive information with the Django ORM.
By Matt, Seb January 09, 2024
This post provides an overview of Talkback, a smart infosec resource aggregator. The post details how the system works, steps through some of its key features, and also presents how to use the UI and GraphQL API.
By Zoltan Madarassy October 03, 2023
Using a sample application, this blog post gives a walkthrough of the I2C communication between the STSAFE-A110 secure element and a host MCU. A tool is released to aid in understanding the I2C flow using a logic analyser.
By Victor Kahan September 06, 2023
This blog post provides a walk-through of ESP32 firmware extraction and analysis to understand the technical implementation of the Litter Robot 3.
By berne July 17, 2023
This blog post covers exploring the Amazon VPC CNI plugin for Kubernetes, and how it can be abused to manipulate networking to expose access to other resources, including in other VPCs.
By elttam May 09, 2023
This blog post provides a summary of the Home Assistant architecture, attack surface, and our approach auditing pre-authentication components. This post summarises and links to a few published advisories, including a Critical pre-authentication vulnerability.