-
Azure Sphere Reverse Engineering
-
Defeating Secure Boot with Symlink Attacks
-
Unpacking Bosch Surveillance Camera Firmware
-
Hack-A-Sat 2020 CTF
-
Culture – The Card That Completes Our Winning Hand
-
A bug and a misconfigured file share: a tale in two parts
-
A Strong Foundation
-
Capital One: Wake Up Call or Snooze Button?
-
Cultivating Q2
-
Looking inside the box
Tools
DAWGMON
Dawg the hallway monitor: monitor operating system changes and analyze introduced attack surface when installing software. See the introductory blogpost
White Papers
Defeating Secure Boot Protections With Symlink and Hard Link Attacks
The white paper demonstrates the use of file systems features of a non-verified partition such as symbolic links (symlinks) to defeat secure boot protection.