649 Followers
410 Following
77 Posts
Unrestrict the restricted mode for USB on iPhone. A first analysis @citizenlab #CVE-2025-24200 πŸ‘‰ https://blog.quarkslab.com/first-analysis-of-apples-usb-restricted-mode-bypass-cve-2025-24200.html
First analysis of Apple's USB Restricted Mode bypass (CVE-2025-24200)

Apple released iOS 18.3.1 (build 22D72) to patch a vulnerability tied to the Accessibility framework and reported by Citizen Lab. Let's analyze it!

Quarkslab's blog

こんにけは Tokyo!

"Of all things, I liked bugs best."
― Nikola Tesla

Quarkslab is happy to participate in Pwn2Own
Automotive and tomorrow we will try to demonstrate a RCE on an Electric Vehicle Charger on stage.

Nikola enlight us, Murphy stay home!

https://www.zerodayinitiative.com/blog/2025/1/21/pwn2own-automotive-2025-the-full-schedule

Zero Day Initiative β€” Pwn2Own Automotive 2025: The Full Schedule

こんにけは and welcome to the second annual Pwn2Own Automotive competition. We are at Automotive World in Tokyo, and we’ve brought together some of the best researchers in the world to test the latest automotive components. We had our random drawing for the order of events earlier today, and from th

Zero Day Initiative

Had a blast again this year helping running the Hardware CTF at #hardwear_io with @doegox @Phil_BARR3TT and Jilles Groenendijk! It's always super cool to see people breaking stuff we've built for this CTF 🀩. See you next year !

#hardwarehacking

and win prizes?
Are you ready for @quarkslab hardware CTF challenges at @hardwear_io #hw_ioNL2024 ?
πŸ—“οΈ October 24, 2024, 10:00 – October 25, 2024, 13:00

Are "MIFARE-compatible" contactless cards not playing fair? That's what you may wonder after
@doegox spotted some odd
behavior.

Curiosity led to experiments that resulted in devising a new attack technique that uncovered some backdoors, and here we are πŸ™€

The RFID hacking spirit lives on!

https://blog.quarkslab.com/mifare-classic-static-encrypted-nonce-and-backdoors.html

MIFARE Classic: exposing the static encrypted nonce variant... and a few hardware backdoors

We studied the most secure static encrypted nonce variant of "MIFARE Classic compatible" cards -- meant to resist all known card-only attacks -- and developed new attacks defeating it, uncovering a hardware backdoor in the process. And that's only the beginning...

Quarkslab's blog

MIFARE Classic: exposing the static encrypted nonce variant

I’ve got a bit more, should I throw it in?

by @doegox from @quarkslab

πŸ”— https://eprint.iacr.org/2024/1275.pdf

#rfid #backdoor #infosec #hardware

Our #pts24 program & booking site are online 😍
- 21 talks on 10 topics, 9 (!) workshops
- by experts from @letsencrypt , Google CT and DFIR teams, @quarkslab , Synacktiv, Revng , KudelskiSec ...

Happy (free) booking!

πŸ‘‰ PROGRAM: https://cfp.pass-the-salt.org/pts2024/schedule/
🎟️ BOOKING SITE: https://pretix.eu/passthesalt/2024/

Thanks for relaying this messageπŸ™β€οΈ

pts2024

Schedule, talks and talk submissions for pts2024

Cryptographic vulnerabilities with a "low" or "informational" severity are like tiny pebbles in your shoe, you know they're in there but why take them out if you can still walk?
Take care of them before they cause major discomfort!
@cryptopote explains why here:

https://blog.quarkslab.com/non-compliant-crypto.html

Non-Compliant, So What?

In cryptography audits, we often find vulnerabilities labeled as low or informational, usually for "non-compliance"... So, what should we do with them?

Quarkslab's blog

Are we human? or are we dancer?
Introducing HydraDancer: A new hardware board and open source firmware for faster USB peripheral emulation.
The Facedancer legacy lives on!
If only we've gone faster it is because we relied on the previous work of our good neighbors

ThiΓ©baud Fuchs tells the story here
https://blog.quarkslab.com/hydradancer-faster-usb-emulation-for-facedancer.html

Hydradancer: Faster USB Emulation for Facedancer

In this blogpost, we present Hydradancer, a new board for Facedancer based on HydraUSB3 allowing faster USB peripherals emulation.

Quarkslab's blog