-
Exploring USB Commands
If you’ve ever had to explore the interfaces of a USB-enabled device, you know how opaque and undocumented many of them can be. While working on this problem,…
4 min read
-
IDA Pro String Heuristics
Lately I’ve been refining a set of heuristics to cut through the noise when dealing with extracted strings during reverse engineering. Anyone who’s spent enough time staring at…
4 min read
-
Filtering strings output
Tired of scrolling through endless walls of garbage when running strings on a binary? Same here. When you’re doing quick triage before diving into reverse engineering, most of…
4 min read
-
Converting code in IDA with a simple script
The below code is a very efficient and simple way of converting chunks of Bytes to code. This becomes specially handy when analyzing large binaries, specially firmware. The…
4 min read
-
How Attackers Can Target Your VSAT from Any Ground-Level Angle
For the last 20 years I have been closely working in the SATCOM industry both helping develop prototypes and securing the most critical systems out there so I…
4 min read
-
Fault Injection III: Connecting the MAXIM4619
In my previous post, I detailed some tests into fault injection techniques on the nRF52 family experimenting with crowbar circuits, and ultimately being surprised by the effects of…
4 min read
