649 Followers
410 Following
77 Posts
Unrestrict the restricted mode for USB on iPhone. A first analysis @citizenlab #CVE-2025-24200 ๐Ÿ‘‰ https://blog.quarkslab.com/first-analysis-of-apples-usb-restricted-mode-bypass-cve-2025-24200.html
First analysis of Apple's USB Restricted Mode bypass (CVE-2025-24200)

Apple released iOS 18.3.1 (build 22D72) to patch a vulnerability tied to the Accessibility framework and reported by Citizen Lab. Let's analyze it!

Quarkslab's blog
@a @wr @sillon_fictionnel ๐ŸŽถ Il vous parle d'un temps que les moins de 20 ans 30 ans 40 ans... Bref, nice job @wr !!

ใ“ใ‚“ใซใกใฏ Tokyo!

"Of all things, I liked bugs best."
โ€• Nikola Tesla

Quarkslab is happy to participate in Pwn2Own
Automotive and tomorrow we will try to demonstrate a RCE on an Electric Vehicle Charger on stage.

Nikola enlight us, Murphy stay home!

https://www.zerodayinitiative.com/blog/2025/1/21/pwn2own-automotive-2025-the-full-schedule

Zero Day Initiative โ€” Pwn2Own Automotive 2025: The Full Schedule

ใ“ใ‚“ใซใกใฏ and welcome to the second annual Pwn2Own Automotive competition. We are at Automotive World in Tokyo, and weโ€™ve brought together some of the best researchers in the world to test the latest automotive components. We had our random drawing for the order of events earlier today, and from th

Zero Day Initiative
@barsteward nice! I'd be happy to merge your version with proper credits on the repo if you wish, or point to your own repo if you're publishing it elsewhere
@barsteward not that I'm aware of

Had a blast again this year helping running the Hardware CTF at #hardwear_io with @doegox @Phil_BARR3TT and Jilles Groenendijk! It's always super cool to see people breaking stuff we've built for this CTF ๐Ÿคฉ. See you next year !

#hardwarehacking

and win prizes?
Are you ready for @quarkslab hardware CTF challenges at @hardwear_io #hw_ioNL2024 ?
๐Ÿ—“๏ธ October 24, 2024, 10:00 โ€“ October 25, 2024, 13:00
@trou thank you ๐Ÿ™

Are "MIFARE-compatible" contactless cards not playing fair? That's what you may wonder after
@doegox spotted some odd
behavior.

Curiosity led to experiments that resulted in devising a new attack technique that uncovered some backdoors, and here we are ๐Ÿ™€

The RFID hacking spirit lives on!

https://blog.quarkslab.com/mifare-classic-static-encrypted-nonce-and-backdoors.html

MIFARE Classic: exposing the static encrypted nonce variant... and a few hardware backdoors

We studied the most secure static encrypted nonce variant of "MIFARE Classic compatible" cards -- meant to resist all known card-only attacks -- and developed new attacks defeating it, uncovering a hardware backdoor in the process. And that's only the beginning...

Quarkslab's blog