Date Thu 19 November 2020
Authors Philippe Teuwen, Christian Herrmann
Category Hardware

Latest news from the Proxmark3 world, crunchy bits included...

Date Thu 12 November 2020
Author Francisco Falcon
Category Reverse-Engineering

Microsoft is currently working on Xtended Flow Guard (XFG), an evolved version of Control Flow Guard (CFG), their own control flow integrity implementation. XFG works by restricting indirect control flow transfers based on type-based hashes of function prototypes. This blog post is a deep dive into how the MSVC compiler generates those XFG function prototype hashes.

Date Fri 16 October 2020
Author Francisco Falcon
Category Exploitation

This blog post analyzes the vulnerability known as "Bad Neighbor" or CVE-2020-16898, a stack-based buffer overflow in the IPv6 stack of Windows, which can be remotely triggered by means of a malformed Router Advertisement packet.

Date Thu 15 October 2020
Author Quarkslab
Category Life at Quarkslab

We LOVE interns! Really. We love them because they bring fresh air to the company and because we see them grow, not only during the internship but also after, when they are hired and can get to work on so many other topics. There are 2 goals for us in every internship we offer:

  • Explore a topic we don't necessarily know very well, hence train the new expert on the topic,

  • Hire you after the internship to keep and share your new expertise with colleagues.

Date Thu 10 September 2020
Author Nahuel Riva
Category Hardware

A blog post about the security implemented in the August Smart Lock, with special focus on the Bluetooth Low Energy capabilities.

Date Tue 18 August 2020
Author Paul Hernault
Category Cryptography

This post is a noob-friendly introduction to whiteboxes along with the presentation and explanation of a (not-new) collision-based attack. The attack is demonstrated against a public whitebox, using QBDI to instrument and analyze the target in order to produce traces of execution.

Date Tue 04 August 2020
Author Tom Czayka
Category Android

This blog post dives into how to get a better understanding of an Android native function by taking full advantage of both Frida and QBDI.


This third article from the Samsung's TrustZone series details some vulnerabilities that were found and how they were exploited to obtain code execution in EL3.

Date Thu 25 June 2020
Authors Christian Heitman, Jonathan Salwan
Category Program Analysis

This blog post is a follow-up on the announcement of Triton v0.8, where we explain how we added support for ARMv7 and provide a guideline for adding new architectures.

Date Tue 09 June 2020
Author 706a5669981f47b5fce062bd6bd6e6a3
Category Vulnerability

A look at the new Fuchsia Operating System.