Tag: reverse-engineering

55 articles
Date Tue 15 October 2024
Authors Maxime Rossi Bellom, Raphaël Neveu
Category Android

We discovered several vulnerabilities impacting the boot chain of several Samsung devices. Chained together, they allow us to execute code in the bootloader, get root access on Android with persistency, and finally leak anything from the Secure World's memory including the Android Keystore keys.

Date Tue 18 June 2024
Authors Philippe Azalbert, Alexandre Chazal
Category Automotive

This blogpost explains how we recovered the firmware of a fleet-sharing Electronic Control Unit (ECU) which has been erased from a FAT memory using Capstone disassembler to locate scattered parts, to be able to reverse-engineer it.

Date Tue 26 March 2024
Author Lucas Di Martino
Category Containers

This second article describes how to convert a Silo into a Server Silo in order to create a Windows Container. In addition, it dives into certain Kernel side Silo mechanisms.

Date Thu 07 March 2024
Authors Eloïse Brocas, Sami Babigeon
Category Reverse-Engineering

Ever wanted to find a nice tool to easily represent cartography results and other graphs? The Sourcetrail tool could be a nice solution! In this blog post, we will introduce two of our tools: Numbat, a new Python API for Sourcetrail, and Pyrrha, a mapper collection for firmware cartography.

Date Tue 06 February 2024
Author Eric Le Guevel
Category Android

Study of an Android runtime (ART) hijacking mechanism for bytecode injection through a step-by-step analysis of the packer used to protect the DJI Pilot Android application.

Date Thu 12 October 2023
Authors Roxane Cohen, Robin David, Riccardo Mori
Category Program Analysis

This blog post presents an overview of QBinDiff, the Quarkslab binary diffing tool officially released today. It describes its core principles and shows how it works on binaries as well as on general graph matching problems unrelated to IT security.

Date Thu 21 September 2023
Author Lucas Di Martino
Category Containers

This article presents the internals of Windows Container.

Date Thu 07 September 2023
Author Francisco Falcon
Category Reverse-Engineering

In this blog post we discuss how to debug Windows' Isolated User Mode (IUM) processes, also known as Trustlets, using the virtual TPM of Microsoft Hyper-V as our target.

Date Tue 29 August 2023
Author Carlo Ramponi
Category Reverse-Engineering

This blog post presents an overview of Starlink's User Terminal runtime internals, focusing on the communications that happen within the device and with user applications and some tools that can help further research on the same topic.

Date Mon 21 August 2023
Authors Sami Babigeon, Benoît Forgette
Category Vulnerability

In this blog post, we present a new vulnerability on the Gecko Bootloader from Silicon Labs more precisely inside the OTA parser.