Explore >> Select a destination


You are here

roundofthree.github.io
| | blog.quarkslab.com
5.6 parsecs away

Travel
| | This third article from the Samsung's TrustZone series details some vulnerabilities that were found and how they were exploited to obtain code execution in EL3.
| | klecko.github.io
4.6 parsecs away

Travel
| | Last month Blue Frost Security published two exploitation challenges for Ekoparty 2022. One of them was a Linux kernel challenge. I don't have much experience with Linux kernel exploitation, so this was a good opportunity to practise. I also write this up as a reference for my future self.
| | www.ambionics.io
5.0 parsecs away

Travel
| | In this blog post, we will explore a new way of exploiting the vulnerability on PHP, using direct calls to iconv(), and illustrate the vulnerability by targeting Roundcube, a popular PHP webmail.
| | dayzerosec.com
33.0 parsecs away

Travel
| Part one: https://dayzerosec.com/blog/2023/04/17/reversing-the-amd-secure-processor-psp.html This is a follow-up part 2 to my previous post on the AMD Secure Processor (formerly known as the Platform Security Processor or "PSP"). In that post, I mentioned that the Cryptographic Co-Processor (CCP) is an essential component of how the PSP functions. It's primarily responsible for hardware-accelerated cryptography, but it's also used as a Direct Memory Access (DMA) copy engine for doing mass copy