Introducing the fix-stomped-imports Binary Ninja plugin, allowing you to reconstruct a stomped Import Address Table when reverse engineering.| LRQA Nettitude Labs
Benefits and drawbacks of using the “Stealth Wiegand Data Interpreter” from Practical Physical Exploitation to capture RFID badges.| LRQA Nettitude Labs
How to use Ghidra's Version Tracking to avoid reverse engineering binaries from scratch when a new software version is released.| LRQA Nettitude Labs
Learn about vulnerabilities in AI systems, including Command Injection, JSON Injection, and SSRF, and how to secure your AI agents.| LRQA Nettitude Labs
Unsafe File Upload and Directory Traversal in Fortra FileCatalyst Workflow and Direct allow an unauthenticated attacker to gain RCE.| LRQA Nettitude Labs
A walkthrough of how to use the Qiling framework to emulate a HTTP server binary from the NEXXT Polaris 150 travel router.| LRQA Nettitude Labs
Artificial Intelligence (AI) has been making significant strides in recent years, with advancements in machine learning and deep learning techniques. However, as AI systems become more complex and powerful, ensuring their safety becomes increasingly critical. In a ground-breaking move towards enhancing AI safety, MLCommons, an open collaboration-focused Artificial Intelligence engineering consortium, has unveiled the MLCommons [...] The post Introducing the MLCommons AI Safety v0.5 Proof of C...| LRQA Nettitude Labs
Technical analysis of CVE-2024-31497, a flaw in PuTTY's P-521 ECDSA implementation which can be leveraged to compromise user's private keys.| LRQA Nettitude Labs
Exploiting remote code execution in Cisco's CIMC management system and jailbreaking the device to run untrusted code| LRQA Nettitude Labs
SharpConflux, a .NET application built to facilitate Confluence exploitation during Red Team and Penetration Testing engagements.| LRQA Nettitude Labs