Our Pwn2Own journey against time and randomness (part 2)
Part 2 of a series about participation in the Pwn2Own Toronto 2023 contest.
more ...Part 2 of a series about participation in the Pwn2Own Toronto 2023 contest.
more ...In this blog post, we present a new vulnerability on the Gecko Bootloader from Silicon Labs more precisely inside the OTA parser.
more ...A journey into the Pwn2Own contest. Part 1: Netgear RAX30 router WAN vulnerabilities
more ...When analyzing an Android application, we often end up playing with the Smali intermediate representation... Way more human readable than the binary DEX code itself, but still not that user friendly. This blog post gives some guidelines on how to read Smali, and start writing you own Smali code!
more ...