Explore >> Select a destination


You are here

www.srlabs.de
| | blog.securityinnovation.com
11.9 parsecs away

Travel
| | Interested in learning how to reverse engineer a device? Here's a quick guide on how to get started.
| | blog.quarkslab.com
10.4 parsecs away

Travel
| | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip.
| | blog.quarkslab.com
12.6 parsecs away

Travel
| | In this first article of a series of three, we will give a tour of the different components of Samsung's TrustZone, explain how they work and how they interact with each other.
| | bradleyjkemp.dev
85.3 parsecs away

Travel
| LaunchDaemon (or LaunchAgent) Hijacking is a MacOS privilege escalation and persistence technique. It involves abusing insecure file/folder permissions to replace legitimately installed, misconfigured LaunchDaemons with malicious code. I first spotted this issue affecting the OSQuery installer but went looking and found multiple other products with the same problem. This isn't a novel technique (it's briefly mentioned in T1543.004) but I was surprised to find it so rarely talked about. Example - Hijacking the OSQuery LaunchDaemon ?? I've already disclosed this issue to the OSQuery team and they kindly let me use it as an example in this post.