Ever wondered how SCADA or ICS systems actually work? This short paper focuses on a demo unit we built and the security risks that can accompany these often overlooked environments.
Rewatched “the Matrix” and wondering what glitching is? In this context, it’s not Déjà vu, but a technique to bypass hardware checks and get a root prompt. In this guide, we apply it to U-Boot.
Watchdog timers can be the bane of exploit-developers existence. We detail techniques to halt, kill, or bypass watchdog timers, even in cases where there are redundant WDTs.
Unpin developer supplied certificates to decrypt app data over SSL (Android versions 7-10)
This simple guide details some of the common tools, configuration steps, and issues data scientists might uncover as they begin to build their first machine learning models and applications.
An in-depth “how-to” guide on cross-compiling legacy systems, for when you can’t seem to find the necessary tools to automate the process.
Unpin developer supplied certificates to decrypt app data over SSL (Android versions 4-6)
This whitepaper details an innovative just-in-time jamming technique developed by Trellix Advanced Threat Research and demonstrates a unique use case for an attack against a popular garage door.