|
You are here |
tyrrrz.me | ||
| | | | |
parsiya.net
|
|
| | | | | [AI summary] The provided text is a detailed technical article discussing various methods and techniques for exploiting custom protocol handlers and command-line switches in applications. It covers topics such as UNC path injection, command-line switch abuse, remote file execution, and leveraging startup directories for persistence. The article also includes practical examples, tools like Nirsoft's URLProtocolView, and advice on how to discover and exploit vulnerabilities in applications. | |
| | | | |
bibwild.wordpress.com
|
|
| | | | | We are a small independent academic institution, that hosts a "digital collections" of digitized historical materials, on the web, using a custom in-house Rails app. We're getting into including some historical video content for the first time, and I didn't have much experience with video, it required me to figure outa few things, that I'm... | |
| | | | |
comsecuris.com
|
|
| | | | | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms. | |
| | | | |
vincent.bernat.ch
|
|
| | | This has been several months since I didn't use much my laptop, an Asus S5N: it was crippled by a short battery life and was hit by several bugs,... | ||