29 Followers
69 Following
126 Posts
IT security research and software development. One man company based in Sweden.
CountrySweden
[RSS] We emulated iOS 14 in QEMU. Here's how we did it.

https://eshard.com/posts/emulating-ios-14-with-qemu
Emulating an iPhone in QEMU

From black screens and boot issues to rendering quirks and PAC puzzles, here’s what we learned getting iOS to finally say hello.

The Electronic Frontier Foundation has released an open source project called Rayhunter. It is designed to run on an inexpensive (~$20) mobile hotspot and look for signs of mobile spying devices called cell-site simulators. Also known as Stingrays or IMSI catchers, they masquerade as legitimate cellphone towers, tricking phones w/in a certain radius into connecting to the device rather than a tower.

https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying

Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying

Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.

Electronic Frontier Foundation
Everyday Ghidra: How Platform Choice Influences Ghidra’s Binary Analysis

In the dynamic world of reverse engineering, where you run your tools can be just as critical as how you run them. Ghidra, the NSA’s powerful open-source software reverse engineering (SRE) suite, is…

Medium

This is your periodic reminder that ambulatory wheelchair users exist. Many folks think wheelchairs are only for those who can't walk at all, or folks who can only take a couple steps.

Wheelchairs and electric scooters are used due to pain, weakness, balance issues, orthostatic intolerance, etc.

#Disability #Wheelchairs #DynamicDisability #ChronicIllness #MEcfs

I just published my writeups for all challenges of #flareon11:

👉 https://blog.washi.dev/posts/flareon11/

👉 https://washi1337.github.io/ctf-writeups/writeups/flare-on/2024/

Hope you like them as much as I liked writing them!

Flare-On 11 Write-Ups

Today a short post.

Washi

Public disclosure was made today so finally I can talk about how I managed to get full access to the Minut M2 IoT device. There will also be a video series, first episode linked below.

The Minut devices (M3 is their newest, my exploit was for the M2) are most often used by short-term rental hosts and before the vendor released new firmware based in my findings there was a real possibility not only that guests could misbehave without the host knowing about it (the product promise) but also that a guest could persist surveillance of any future guests.

Kudos to Minut for having been excellent to work with and amazingly fast at reacting to my report.

https://www.youtube.com/watch?v=ZbKLAjPYOEg

#ReverseEngineering #CyberSecurity #IoT #HardwareHacking

Hacking the Minut M2 IoT sensor

YouTube

A reminder that Visual Studio Code’s marketplace is still an absolute security clusterfuck that Microsoft have engineered.

There’s active supply chain attacks in there nobody has reported on. (That, yes, will get a cartoon porg blog on one day).

Boy named after Star Wars character denied passport due to copyright infringement

A family's holiday was cancelled until the Home Office reversed its passport decision.

NZ Herald
Why is there no x64dbg-analog on Linux? I really, really hate command line debuggers like gdb

Well then, it was time to get some new security keys with usb c support anyway..

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel

Sophisticated attack breaks security assurances of the most popular FIDO key.

Ars Technica