Explore >> Select a destination


You are here

limitedresults.com
| | danielmangum.com
3.3 parsecs away

Travel
| | Isolating sensitive data and operations is a fundamental issue in computing. Ideally, we want to minimize the possibility of a software defect compromising the security of a device. However, in order for the software we write to be useful, it typically needs to interact with that sensitive data in some form or fashion. So how do we interact with sensitive data without being able to access it? The answer is that we bring only the operations that must access the sensitive data closer to the data, then force all other software to invoke those operations via some sort of interface.
| | oxide.computer
3.5 parsecs away

Travel
| | A write up of the LPC55S69 ROM Patch.
| | grazfather.github.io
3.5 parsecs away

Travel
| | [AI summary] The article describes the process of building a glitching tool using an FPGA to exploit a vulnerability in a target board's bootloader. The tool uses UART communication and precise timing to induce a voltage glitch at the right moment to trick the bootROM into thinking the bootloader is unlocked, allowing unauthorized access to the flash memory. The author discusses the design, setup, simulation, and testing of the glitcher, highlighting challenges like clock speed differences, pulse width granularity, and hardware modifications to achieve successful glitching.
| | machevalia.blog
18.4 parsecs away

Travel
| [AI summary] A blog post discusses a remote code execution vulnerability in Ivanti's Endpoint Manager Cloud Appliance, detailing its exploitation and the author's bounty hunting activities.