Articles by Benoît Forgette
5 articles
Techniques for analyzing binaries or kernel modules that may try to monitor themselves, similar to malware behavior. To avoid detection during analysis, one approach is to use an hypervisor like QEMU to conduct research within a virtualized environment. Although the target may realize it is running in a virtual machine, this usually does not trigger suspicion, as hypervisors are common in modern environments. This method allows for detailed analysis while maintaining stealth, making it effective in scenarios where the target must not detect the monitoring.
Authors Eloïse Brocas, Damien Cauquil, Robin David, Benoît Forgette
Category Vulnerability
Part 2 of a series about participation in the Pwn2Own Toronto 2023 contest.
In this blog post, we present a new vulnerability on the Gecko Bootloader from Silicon Labs more precisely inside the OTA parser.
Authors Eloïse Brocas, Damien Cauquil, Robin David, Benoît Forgette
Category Vulnerability
A journey into the Pwn2Own contest. Part 1: Netgear RAX30 router WAN vulnerabilities
When analyzing an Android application, we often end up playing with the Smali intermediate representation... Way more human readable than the binary DEX code itself, but still not that user friendly. This blog post gives some guidelines on how to read Smali, and start writing you own Smali code!