Tag: 2026

18 articles
Date Thu 16 April 2026
Author Robert Yates
Category Program Analysis

How one Commit Broke Obfuscation: A blog post exploring the role of compilers and optimizations in the field of obfuscation and de-obfuscation.

Date Tue 14 April 2026
Author Sami Babigeon
Category Program Analysis

Since its initial released in December 2023, many people have used and built tools around the BSIM feature of Ghidra but up to this date its internals were unknown. This post brings some light on how BSIM works, theoretically and in it's C++ implementation.

Date Thu 09 April 2026
Author Romain Marchand
Category Automotive

From hardware analysis to OSINT: how we retrieved information about a BYD car crash by analyzing the TCU embedded memory.

Date Tue 07 April 2026
Author Lucas Laise
Category Vulnerability

Exploitation of an arbitrary directory deletion via symlink following in the antivirus Intego.

Date Thu 02 April 2026
Authors Sami Babigeon, Benoît Forgette
Category Program Analysis

In this blog post we present SightHouse, an open-source tool designed to assist reverse engineers by retrieving information and metadata from programs and identifying similar functions already known from other libraries, binaries or any other source codes that can be found online.

Date Tue 31 March 2026
Authors Laurent Laubin, Sami Babigeon, Christian Heitman
Category Reverse-Engineering

In this blog, we present how QBDI and TritonDSE can be used to attack a complex C++ binary implementing a VM.

Date Thu 26 March 2026
Author Keissy BOD
Category Pentest

Deep dive into Web Application Firewall (WAF) bypasses, from misconfiguration exploitation to crafting obfuscated payloads. We show the impact of the parsing discrepancy between how a WAF reads a request and how a backend executes it. It is not a bug, it is a feature.

Date Fri 20 March 2026
Author Mathieu Farrell
Category Vulnerability

This blog post dives into the most common classes of macOS Local Privilege Escalation vulnerabilities, from insecure XPC communications and time-of-check to time-of-use (TOCTOU) Race Conditions to a range of implementation and configuration oversights. We will explore how attackers can exploit these weaknesses to escalate privileges, and highlight real-world examples to illustrate recurring patterns. This post ends the series on Intego products on macOS by revealing vulnerabilities that can lead to Local Privilege Escalation, as well as a surprise bonus.

Date Thu 12 March 2026
Author Damien Cauquil
Category Reverse-Engineering

In a blog post published last December, we demonstrated how we managed to extract the firmware from a smartwatch by exploiting an out-of-bounds read vulnerability and spying on its screen interface. Follow us on our long and unexpected journey to figure out how this smartwatch can measure heart rate or blood pressure with no visible sensor, the problems we encountered while analyzing its firmware, and how we solved them to uncover The Truth about this device.

Date Wed 11 March 2026
Author Jean Vincent
Category Exploitation

PageJack is a Linux kernel exploitation technique useful to generate a Use After Free (UAF) in the page allocator. In this article we provide a detailed example of how to use it to exploit a Linux kernel vulnerability from 2022.