|
You are here |
blog.quarkslab.com | ||
| | | | |
comsecuris.com
|
|
| | | | | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms. | |
| | | | |
www.anvilsecure.com
|
|
| | | | | I reversed the firmware of my Garmin Forerunner 245 Music back in 2022 and found a dozen or so vulnerabilities in their support for Connect IQ applications. They can be exploited... | |
| | | | |
blog.thalium.re
|
|
| | | | | [AI summary] The provided text is a detailed technical analysis of a security vulnerability in the TEEgris secure kernel of a Samsung device, focusing on exploit development and reverse engineering techniques. It outlines the following key points: | |
| | | | |
healeycodes.com
|
|
| | | Making my programming language 4000x quicker, and adding a static type checker. | ||