Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2022.12.16.md
Firmware key extraction by gaining EL3 - https://blog.xilokar.info/firmware-key-extraction-by-gaining-el3.html
Practically-exploitable Cryptographic Vulnerabilities in Matrix - https://nebuchadnezzar-megolm.github.io/
Sniffing SSH Passwords - https://networklogician.com/2021/04/17/sniffing-ssh-passwords/
Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) - https://www.praetorian.com/blog/reversing-and-exploiting-embedded-devices-part-1-the-software-stack/
Canary in the Kernel Mine: Exploiting and Defending Against Same-Type Object Reuse - https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse
Firmware key extraction by gaining EL3 - https://blog.xilokar.info/firmware-key-extraction-by-gaining-el3.html
Practically-exploitable Cryptographic Vulnerabilities in Matrix - https://nebuchadnezzar-megolm.github.io/
Sniffing SSH Passwords - https://networklogician.com/2021/04/17/sniffing-ssh-passwords/
Reversing and Exploiting Embedded Devices: The Software Stack (Part 1) - https://www.praetorian.com/blog/reversing-and-exploiting-embedded-devices-part-1-the-software-stack/
Canary in the Kernel Mine: Exploiting and Defending Against Same-Type Object Reuse - https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse
Zaloguj się aby komentować