IoT
NTitanNit Web Control 2.01 / Atemio 7600 Root Remote Command Execution
The Atemio AM 520 HD Full HD satellite receiver has a vulnerability that enables an unauthorized attacker to execute system commands with elevated ...
NNew BLUFFS attack lets attackers hijack Bluetooth connections
Researchers at Eurecom have developed six new attacks collectively named 'BLUFFS' that can break the secrecy of Bluetooth sessions, allowing for de...
N计时瞬态执行:针对英特尔处理器的新型侧信道攻击
一摘要瞬态执行攻击(Transient Execution Attack)是一种利用现代 CPU 优化技术漏洞的攻击。侧信道(Side-channel)是瞬态执行攻击泄漏数据的关键部分。在这...
Tapping into a telecommunications company’s office cameras
I have a fun little API flaw worth talking about today. An unauthenticated API endpoint in a major telecommunications company’s office camera syste...
难以想象的芯片UAF漏洞,Zenbleed漏洞分析
1简介Zenbleed是一个在AMD Zen2架构上的指令集漏洞,这个漏洞也是由预测执行产生的。但相对于Spectre漏洞,Zenbleed并不需要时间侧信道,攻击方法也远比Spect...
ARM64 Reversing And Exploitation Part 9 – Exploiting An Off By One Overflow Vulnerability
Hello everyone! In this blog post, we will dive into a new vulnerability called off by one byte overflow . But before we get into the details, ther...
PWN入门之Stack Overflow
本文是i春秋论坛签约作家「Binary star」分享的技术文章,公众号旨在为大家提供更多的学习方法与技能技巧,文章仅供学习参考。Binary star大家好,我是Binary...
SonicWall GMS 漏洞分析
招新小广告CTF组诚招re、crypto、pwn、misc、合约方向的师傅,长期招新IOT+Car+工控+样本分析多个组招人有意向的师傅请联系邮箱[email protected](带上简历和想...
Our Pwn2Own journey against time and randomness (part 2)
Part 2 of a series about participation in the Pwn2Own Toronto 2023 contest. 关于参加 Pwn2Own Toronto 2023 比赛的系列文章的第 2 部分。 This blogpo...
ARM64 Reversing And Exploitation Part 8 – Exploiting An Integer Overflow Vulnerability
Hello everyone, 大家好, In this blog, we will explore integer overflows and their potential to create issues within your software. We will provide...