Explore >> Select a destination


You are here

blog.quarkslab.com
| | comsecuris.com
14.2 parsecs away

Travel
| | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms.
| | www.anvilsecure.com
13.7 parsecs away

Travel
| | I reversed the firmware of my Garmin Forerunner 245 Music back in 2022 and found a dozen or so vulnerabilities in their support for Connect IQ applications. They can be exploited...
| | blog.thalium.re
12.0 parsecs away

Travel
| | [AI summary] The provided text is a detailed technical analysis of a security vulnerability in the TEEgris secure kernel of a Samsung device, focusing on exploit development and reverse engineering techniques. It outlines the following key points:
| | healeycodes.com
35.2 parsecs away

Travel
| Making my programming language 4000x quicker, and adding a static type checker.