We take a brief look into Radio Frequency (RF) theory, Software Defined Radio (SDR), and visual analysis of various RF signal characteristics. We discover a good methodology for reversing RF signals, along with some simple analysis of some common RF remote devices that might be found around the home.
Analysis of compiler stack canaries and their implementation across various architectures.
We decided to audit libotr to gauge its general maturity. Within several hours we identified a number of insecure coding practice issues and a lack of documentation that were reported. While we didn't find any serious security vulnerabilities, our gut feeling is the code uses enough bad programming constructs to warrant further investigation before getting a tick of approval. This post shares some of our work from the audit, and also some recommendations for software security relevant to the EFF Secure IM Scorecard work.
Journey of hunting for bugs in the WAG54G routers http daemon. The end goal of this research is to find a way to remotely flash C&C firmware (pre-auth), while learning a thing or two along the way... hey, we'd never actually touched MIPS assembly before this!
First part in a series of reviews against IM clients promoted by the EFF secure messaging scorecard, drawing from real examples to demonstrate the dependency between privacy and security. Findings have been patched in the latest release of target application.