ROPing our way to RCE

From vulnerability to exploit - this post explores the journey of developing an ARM ROP chain to exploit a buffer overflow in uc-http. ...

February 7, 2025 · 1 min · 29 words · born0monday

Exploring CVE-2023-2163: My Intro to Kernel Hacking

Ever since I got into security, kernel exploitation has fascinated me. So for my bachelor’s thesis, I finally decided to take a first dive into this deep and complex field - one that always seems to have more layers to uncover. ...

December 30, 2024 · 1 min · 211 words · born0monday

Beyond the @ Symbol: Exploiting the Flexibility of Email Addresses to gain RCE

As part of a security research, my collegue parzel and I examined the commercial and open source spam filter appliance MailCleaner. It turned out that the software was not fully aware of the flexibility offered by email address specifications, and as a result, we found an RCE that could be triggered by sending a malicious email. ...

June 7, 2024 · 1 min · 62 words · born0monday