CyberSecurity Blog

  • Exploring USB Commands

    If you’ve ever had to explore the interfaces of a USB-enabled device, you know how opaque and undocumented many of them can be. While working on this problem,…

    Continue Reading

    4 min read

  • IDA Pro String Heuristics

    Lately I’ve been refining a set of heuristics to cut through the noise when dealing with extracted strings during reverse engineering. Anyone who’s spent enough time staring at…

    Continue Reading

    4 min read

  • Filtering strings output

    Tired of scrolling through endless walls of garbage when running strings on a binary? Same here. When you’re doing quick triage before diving into reverse engineering, most of…

    Continue Reading

    4 min read

  • Converting code in IDA with a simple script

    The below code is a very efficient and simple way of converting chunks of Bytes to code. This becomes specially handy when analyzing large binaries, specially firmware. The…

    Continue Reading

    4 min read

  • How Attackers Can Target Your VSAT from Any Ground-Level Angle

    For the last 20 years I have been closely working in the SATCOM industry both helping develop prototypes and securing the most critical systems out there so I…

    Continue Reading

    4 min read

  • Fault Injection III: Connecting the MAXIM4619

    In my previous post, I detailed some tests into fault injection techniques on the nRF52 family experimenting with crowbar circuits, and ultimately being surprised by the effects of…

    Continue Reading

    4 min read