ENOWARS 9 is coming in less than 2 weeks! The A/D CTF will take place on July 19, 2025.
Don't forget to sign up! :)
bsky | https://bsky.app/profile/dmnk.bsky.social |
DΞCOMPILΞ | NΣVΞR |
jmp | AAAAAAAA |
Segmentation fault | (core dumped) |
ENOWARS 9 is coming in less than 2 weeks! The A/D CTF will take place on July 19, 2025.
Don't forget to sign up! :)
Unveiled at #TROOPERS25 - Hexagon fuzzing unlocked
Hexagon is the architecture in Qualcomm basebands - they power most of the world's leading smartphones.
Until now, this baseband was out of reach.
We released the first open-source toolchain for system-mode Hexagon fuzzing, presented by Luca Glockow (@luglo), Rachna Shriwas, and Bruno Produit (@bruno) at @WEareTROOPERS
Full post: https://www.srlabs.de/blog-post/hexagon-fuzz-full-system-emulated-fuzzing-of-qualcomm-basebands
How we opened up mobile firmware in 3 steps:
1. Boot real iPhone basebands with a custom QEMU fork
2. Rust-powered fuzzer controls execution via JSON configs
3. Ghidra integration maps coverage across threads
This brings full visibility to Qualcomm’s 4G/5G/GPS stacks.
Reproducible. Extendable. Open source.
Hexagon’s no longer off-limits - mobile security just got a lot more transparent.
🔗 Try it yourself: https://github.com/srlabs/hexagon_fuzz
📚 Docs: https://github.com/srlabs/hexagon_fuzz/blob/main/docs/reverse_engineering.md
🖥️ Slides from Troopers25: https://github.com/srlabs/hexagon_fuzz/blob/main/docs/talk/hexagon_fuzz_troopers2025.pdf
🛠️ Issues, ideas, or contributions? PRs welcome.
A new @OpenSecurityTraining2 course just dropped!
#Fuzzing 1001: Introductory white-box fuzzing with AFL++
https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Fuzz1001_Intro_AFL+2025_v1/about
Are you looking for an automated way to find bugs in your code? In this course, you'll learn how to use AFL++ to test and identify vulnerabilities, leveraging a white-box approach to make your testing more efficient and targeted. By the end, you'll be ready to start fuzzing real-world software and contribute to improving its security.