Our Blog

Our news

All you need to know

[Dual-Pod-Shock] Emotional abuse of a DualShock

Reading time: ~35 min
Hacking PlayStation DualShock controllers to stream audio to their internal speakers. Ciao a tutti. Introduction I didn’t really know what...

Hacking doom for fun, health and ammo

Reading time: ~19 min
Remember iddqd and idkfa? Those are two strings were etched into my brain at a very young age where fond...

Abusing GDI Objects for ring0 Primitives Revolution

Reading time: ~21 min
Exploiting MS17-017 EoP Using Color Palettes This post is an accompaniment to the Defcon 25 talk given by Saif. One...

MAPI over HTTP and Mailrule Pwnage

Reading time: ~8 min
History In December 2015 Silent Break Security wrote about “Malicious Outlook Rules” and using these to get a remote shell....

January Get Fit Reversing Challenge

Reading time: ~4 min
Aah, January, a month where resolutions usually flare out spectacularly before we get back to the couch in February. We’d...

Dangers of Custom ASP.NET HttpHandlers

Reading time: ~2 min
ASP.NET HttpHandlers are interesting components of a .NET web application when performing security assessments, mainly due to the fact they...

44Con: Vulnerability analysis of the .NET smart Card Operating System

Reading time: ~1 min
Today’s smart cards such as banking cards and smart corporate badges are capable of running multiple tiny applications which are...

RSA SecureID software token update

Reading time: ~4 min
There has been a healthy reaction to our initial post on our research into the RSA SecureID Software Token. A...

A closer look into the RSA SecureID software token

Reading time: ~7 min
Widespread use of smart phones by employees to perform work related activities has introduced the idea of using these devices...

Mobile Security Summit 2011

Reading time: ~1 min
This week, Charl van der Walt and I (Saurabh) spoke at Mobile Security Summit organized by IIR (http://www.iir.co.za/detail.php?e=2389). Charl was...

Decrypting iPhone Apps

Reading time: ~6 min
This blog post steps through how to convert encrypted iPhone application bundles into plaintext application bundles that are easier to...

Analysis of a UDP worm

Reading time: ~4 min
Introduction From time to time I like to delve into malware analysis as a pastime and post interesting examples, and...

Decrypting Symantec BackupExec passwords

Reading time: ~1 min
BackupExec agent is often among common services found on the internal pen tests. The agent software stores an encrypted “logon...

QoW: Software Reversing and Exploitation

Reading time: ~1 min
I’ve developed a FTP like multi-threaded server application as a target for this challenge of the month. It has been...

Lets hope it does better than netsec.reddit..

Reading time: Less than a minute
Introducing [http://www.reddit.com/r/ReverseEngineering/] (like its name suggests, a reddit thats all about Code RE..)

Adobe APSB08-15 Patch Reversing

Reading time: ~1 min
APSB08-15 is the latest adobe security advisory regarding a memory corruption vulnerabilty in Acrobat Reader versions <8.1.2 As expected, the advisory...