domenuk

@dmnk@infosec.exchange
1.5K Followers
440 Following
578 Posts
【DΞCOMPILΞ NΣVΞR】
Connectivity & Baseband Security
@aflplusplus @enoflag @google
(opinions my own)
bskyhttps://bsky.app/profile/dmnk.bsky.social
DΞCOMPILΞNΣVΞR
jmpAAAAAAAA
Segmentation fault(core dumped)

ENOWARS 9 is coming in less than 2 weeks! The A/D CTF will take place on July 19, 2025.

Don't forget to sign up! :)

https://9.enowars.com/

#CTF #ENOWARS

ENOFLAG CTF Setup

Repost if you can hear this image blaring
Seriously. What’s your excuse for still being on X at this point. They’ve literally built HitlerBot.

Unveiled at #TROOPERS25 - Hexagon fuzzing unlocked

Hexagon is the architecture in Qualcomm basebands - they power most of the world's leading smartphones.

Until now, this baseband was out of reach.

We released the first open-source toolchain for system-mode Hexagon fuzzing, presented by Luca Glockow (@luglo), Rachna Shriwas, and Bruno Produit (@bruno) at @WEareTROOPERS

Full post: https://www.srlabs.de/blog-post/hexagon-fuzz-full-system-emulated-fuzzing-of-qualcomm-basebands

How we opened up mobile firmware in 3 steps:
1. Boot real iPhone basebands with a custom QEMU fork
2. Rust-powered fuzzer controls execution via JSON configs
3. Ghidra integration maps coverage across threads

This brings full visibility to Qualcomm’s 4G/5G/GPS stacks.

Reproducible. Extendable. Open source.

Hexagon’s no longer off-limits - mobile security just got a lot more transparent.


🔗 Try it yourself: https://github.com/srlabs/hexagon_fuzz
📚 Docs: https://github.com/srlabs/hexagon_fuzz/blob/main/docs/reverse_engineering.md
🖥️ Slides from Troopers25: https://github.com/srlabs/hexagon_fuzz/blob/main/docs/talk/hexagon_fuzz_troopers2025.pdf
🛠️ Issues, ideas, or contributions? PRs welcome.

Hexagon fuzz: Full-system emulated fuzzing of Qualcomm basebands

Bruno Produit, Luca Glockow, Rachna Shriwas

Fuzzing 1001: Introductory white-box fuzzing with AFL++

Are you looking for an automated way to find bugs in your code? In this course, you'll learn how to use AFL++ to test and identify vulnerabilities, leveraging a white-box approach to make your testing more efficient and targeted. By the end, you'll be ready to start fuzzing real-world software and contribute to improving its security.

Today in #ITSecurity gone wrong: I am in Austria as a German. I just received a notification via cell broadcast about a fire in the area. The broadcast contains a URL - but this URL is only accessible from an Austrian IP address. My LTE roaming IP isn’t allowed. So… I guess I just suffocate because I have the wrong IP address, then? 😅
Want to learn how to build your own #libafl components, but never had the right project? Try working through the interactive exercises that I released today: https://github.com/addisoncrump/parking-game-fuzzer

You'll work through building your own LibAFL components with templates, allowing you to understand them progressively through the context of trying to solve "Tokyo Parking" (AKA Thinkfun's "Rush Hour") puzzles with fuzzing.

#fuzzing #aflplusplus #puzzles #rust #rustlang
GitHub - addisoncrump/parking-game-fuzzer: Learn to LibAFL with parking-game puzzles.

Learn to LibAFL with parking-game puzzles. Contribute to addisoncrump/parking-game-fuzzer development by creating an account on GitHub.

GitHub
Oh the humanity…
@whitequark @azonenberg @gsuberland The culture of extensive reverse engineering and binary patching to extend proprietary dev tools on Windows has always made me smile. This is one of the crazier examples: https://gitlab.com/VC6Ultimate/VC6Ultimate
VC6 Ultimate / VC6Ultimate · GitLab

VC6 Fan made 20th Anniversary Service Pack

GitLab
Okay shut it down we found the best and hottest take