CyberSecurity Blog

  • QRNGabri – Quantum RNG

    I’ve built a real Quantum Random Number Generator, and it’s now live. http://www.gabrielcybersecurity.com/QRNG A QRNG is different from a conventional pseudo-random number generator because it does not rely…

    Continue Reading

    4 min read

  • Reverse Engineering Mask ROM

    Progressing a bit more on the #Silicon #RE side, I came across the structure used for manufacturing ROM (from the same paper as last time) and how it…

    Continue Reading

    4 min read

  • Exploring USB Commands

    If you’ve ever had to explore the interfaces of a USB-enabled device, you know how opaque and undocumented many of them can be. While working on this problem,…

    Continue Reading

    4 min read

  • IDA Pro String Heuristics

    Lately I’ve been refining a set of heuristics to cut through the noise when dealing with extracted strings during reverse engineering. Anyone who’s spent enough time staring at…

    Continue Reading

    4 min read

  • Filtering strings output

    Tired of scrolling through endless walls of garbage when running strings on a binary? Same here. When you’re doing quick triage before diving into reverse engineering, most of…

    Continue Reading

    4 min read

  • Converting code in IDA with a simple script

    The below code is a very efficient and simple way of converting chunks of Bytes to code. This becomes specially handy when analyzing large binaries, specially firmware. The…

    Continue Reading

    4 min read