<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>elttam - Security Assessment Services</title>
        <description></description>
        <link>https://www.elttam.com/</link>
        <atom:link href="https://www.elttam.com/feed.xml" rel="self" type="application/rss+xml"/>
        <pubDate>Thu, 26 Feb 2026 20:31:50 -0600</pubDate>
        <lastBuildDate>Thu, 26 Feb 2026 20:31:50 -0600</lastBuildDate>
        <generator>Jekyll</generator>
        
            <item>
                <title>ORM Leaking More Than You Joined For</title>
                <author>elttam - Alex Brown</author>
                <description>A follow-up article in our ORM Leaks series covering newly susceptible ORMs, techniques for bypassing ORM Leak protections, and demonstrating how ORM Leaks can exist in any web application that uses one.</description>
                <pubDate>Thu, 18 Dec 2025 06:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/leaking-more-than-you-joined-for/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/leaking-more-than-you-joined-for/</guid>
                
                <category>ORM</category>
                
                <category>ORM Leaks</category>
                
                <category>Web</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Gotchas in Email Parsing - Lessons From Jakarta Mail</title>
                <author>elttam - Jia Hao Poh</author>
                <description>This writeup goes through the various primitives in Jakarta Mail that could lead to high impact bugs if developers are unaware of the library&apos;s quirks. Primitives discussed here here can be applied to other mail parsing libraries.</description>
                <pubDate>Mon, 17 Nov 2025 18:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/jakarta-mail-primitives/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/jakarta-mail-primitives/</guid>
                
                <category>web</category>
                
                <category>java</category>
                
                <category>jakarta mail</category>
                
                <category>input validation</category>
                
                <category>footguns</category>
                
                <category>primitives</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>New Method to Leverage Unsafe Reflection and Deserialisation to RCE on Rails</title>
                <author>elttam - Alex Brown</author>
                <description>This blog article documents a new unsafe reflection gadget in the sqlite3 gem, that can also be used in a deserialisation gadget chain to achieve RCE and is installed by default in new Rails applications.</description>
                <pubDate>Tue, 04 Mar 2025 18:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/rails-sqlite-gadget-rce/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/rails-sqlite-gadget-rce/</guid>
                
                <category>web</category>
                
                <category>ruby</category>
                
                <category>rails</category>
                
                <category>unsafe reflection</category>
                
                <category>deserialisation</category>
                
                <category>constantize</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>A Monocle on Chronicles</title>
                <author>elttam - Matt</author>
                <description>This post provides an overview of Talkback Chronicles for viewing snapshots of trending infosec resources for points in time, and also how to subscribe to a new weekly Newsletter feature.</description>
                <pubDate>Wed, 02 Oct 2024 19:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/monocle-on-chronicles/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/monocle-on-chronicles/</guid>
                
                <category>infosec</category>
                
                <category>tool</category>
                
                <category>talkback</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>DUCTF 2024 ESPecially Secure Boot Writeup</title>
                <author>elttam - daniel</author>
                <description>This blog post covers a DUCTF 2024 pwn challenge called &quot;ESPecially Secure Boot&quot;, which required writing an exploit for CVE-2018-18558.</description>
                <pubDate>Thu, 01 Aug 2024 19:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/ductf24-especially-secure-boot/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/ductf24-especially-secure-boot/</guid>
                
                <category>hardware</category>
                
                <category>iot</category>
                
                <category>esp32</category>
                
                <category>esp-idf</category>
                
                <category>xtensa</category>
                
                <category>reverse-engineering</category>
                
                <category>embedded</category>
                
                <category>cve-2018-18558</category>
                
                <category>mcu</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>plORMbing your Prisma ORM with Time-based Attacks</title>
                <author>elttam - Alex Brown</author>
                <description>Part two of our ORM Leak series about attacking the Prisma ORM and leaking sensitive data in a time-based attack.</description>
                <pubDate>Mon, 08 Jul 2024 19:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/plorming-your-primsa-orm/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/plorming-your-primsa-orm/</guid>
                
                <category>ORM</category>
                
                <category>ORM Leaks</category>
                
                <category>Prisma</category>
                
                <category>Web</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>plORMbing your Django ORM</title>
                <author>elttam - Alex Brown</author>
                <description>This blog article explains what are ORM Leak vulnerabilities, how they could be exploited to access sensitive information with the Django ORM.</description>
                <pubDate>Sun, 23 Jun 2024 19:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/plormbing-your-django-orm/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/plormbing-your-django-orm/</guid>
                
                <category>ORM</category>
                
                <category>ORM Leaks</category>
                
                <category>Django</category>
                
                <category>Web</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Keeping up with the Pwnses</title>
                <author>elttam - Matt, Seb</author>
                <description>This post provides an overview of Talkback, a smart infosec resource aggregator. The post details how the system works, steps through some of its key features, and also presents how to use the UI and GraphQL API.</description>
                <pubDate>Tue, 09 Jan 2024 18:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/talkback-intro/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/talkback-intro/</guid>
                
                <category>infosec</category>
                
                <category>tool</category>
                
                <category>talkback</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Exploring the STSAFE-A110</title>
                <author>elttam - Zoltan Madarassy</author>
                <description>Using a sample application, this blog post gives a walkthrough of the I2C communication between the STSAFE-A110 secure element and a host MCU. A tool is released to aid in understanding the I2C flow using a logic analyser.</description>
                <pubDate>Tue, 03 Oct 2023 19:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/stsafe-a110/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/stsafe-a110/</guid>
                
                <category>hardware</category>
                
                <category>stsafe-a110</category>
                
                <category>iot</category>
                
                <category>secure element</category>
                
                <category>st32</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>RE of LR3</title>
                <author>elttam - Victor Kahan</author>
                <description>This blog post provides a walk-through of ESP32 firmware extraction and analysis to understand the technical implementation of the Litter Robot 3.</description>
                <pubDate>Wed, 06 Sep 2023 07:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/re-of-lr3/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/re-of-lr3/</guid>
                
                <category>iot</category>
                
                <category>embedded</category>
                
                <category>esp32</category>
                
                <category>esp-idf</category>
                
                <category>xtensa</category>
                
                <category>reverse-engineering</category>
                
                <category>api</category>
                
                <category>mobile</category>
                
                <category>flutter</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Abusing Amazon VPC CNI plugin for Kubernetes</title>
                <author>elttam - berne</author>
                <description>This blog post covers exploring the Amazon VPC CNI plugin for Kubernetes, and how it can be abused to manipulate networking to expose access to other resources, including in other VPCs.</description>
                <pubDate>Mon, 17 Jul 2023 05:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/amazon-vpc-cni/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/amazon-vpc-cni/</guid>
                
                <category>aws</category>
                
                <category>eks</category>
                
                <category>iam</category>
                
                <category>k8s</category>
                
                <category>cloud</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>PwnAssistant - Controlling /home&apos;s via a Home Assistant RCE</title>
                <author>elttam - elttam</author>
                <description>This blog post provides a summary of the Home Assistant architecture, attack surface, and our approach auditing pre-authentication components. This post summarises and links to a few published advisories, including a Critical pre-authentication vulnerability.</description>
                <pubDate>Tue, 09 May 2023 19:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/pwnassistant/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/pwnassistant/</guid>
                
                <category>web</category>
                
                <category>iot</category>
                
                <category>cve-2023-27482</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Cracking the Odd Case of Randomness in Java</title>
                <author>elttam - joseph</author>
                <description>This blog post details a technique for breaking Apache Commons Lang&apos;s RandomStringUtils and Java&apos;s random.nextInt(bound) when the bound is odd. A tool is released which demonstrates the practicality of the attack.</description>
                <pubDate>Thu, 09 Feb 2023 18:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/cracking-randomness-in-java/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/cracking-randomness-in-java/</guid>
                
                <category>crypto</category>
                
                <category>web</category>
                
                <category>java</category>
                
                <category>rng</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Golang code review notes</title>
                <author>elttam - Zoltan Madarassy</author>
                <description>This blog post is aimed to help people performing security code reviews on Golang code bases to identify dangerous code patterns.</description>
                <pubDate>Thu, 30 Jun 2022 07:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/golang-codereview/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/golang-codereview/</guid>
                
                <category>golang</category>
                
                <category>go</category>
                
                <category>codereview</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>ESP-IDF setup guide</title>
                <author>elttam - Daniel Hodson</author>
                <description>This post is for vulnerability researchers looking at the ESP32 and would like a quick setup guide.</description>
                <pubDate>Mon, 06 Jun 2022 07:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/esp-idf-setup-guide/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/esp-idf-setup-guide/</guid>
                
                <category>iot</category>
                
                <category>embedded</category>
                
                <category>mcu</category>
                
                <category>esp32</category>
                
                <category>esp-idf</category>
                
                <category>lsp</category>
                
                <category>ccls</category>
                
                <category>llvm</category>
                
                <category>qemu</category>
                
                <category>gdb</category>
                
                <category>xtensa</category>
                
                <category>debugging</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Tuya IoT and EZ Mode Pairing</title>
                <author>elttam - Mykel Pritchard</author>
                <description>This blog post aims to highlight how EZ mode pairing implemented by Mirabella Genio and other Tuya Cloud IoT devices broadcast your WiFi credentials to the neighbourhood.</description>
                <pubDate>Wed, 09 Dec 2020 06:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/ez-mode-pairing/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/ez-mode-pairing/</guid>
                
                <category>iot</category>
                
                <category>wifi</category>
                
                <category>esp8266</category>
                
                <category>esp8285</category>
                
                <category>tuya</category>
                
                <category>EZ Mode</category>
                
                <category>Tuya Link</category>
                
                <category>SmartConfig</category>
                
                <category>ESPTouch</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Attacks on GCM with Repeated Nonces</title>
                <author>elttam - Sebastien Macke</author>
                <description>This blog post illustrates the security consequences of nonce-reuse in AES-GCM with a Proof of Concept exploit on a vulnerable demo application</description>
                <pubDate>Fri, 25 Sep 2020 07:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/key-recovery-attacks-on-gcm/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/key-recovery-attacks-on-gcm/</guid>
                
                <category>crypto</category>
                
                <category>web</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Simple Bugs With Complex Exploits</title>
                <author>elttam - Faraz</author>
                <description>This blog post details a root cause analysis for Project Zero Issue 2046 found by Sergey Glazunov.</description>
                <pubDate>Thu, 03 Sep 2020 10:30:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/simple-bugs-with-complex-exploits/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/simple-bugs-with-complex-exploits/</guid>
                
                <category>chrome</category>
                
                <category>v8</category>
                
                <category>turbofan</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Lua SUID Shells</title>
                <author>elttam - Brendan Scarvell</author>
                <description>This blog post explores how privileged Lua scripts can pop shells without dropping privileges.</description>
                <pubDate>Thu, 09 Jul 2020 12:30:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/lua-suid-shells/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/lua-suid-shells/</guid>
                
                <category>lua</category>
                
                <category>privilege escalation</category>
                
                <category>linux</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Hacking with Environment Variables</title>
                <author>elttam - Luke Jahnke</author>
                <description>A look into how scripting language interpreters can execute arbitrary commands when supplied with malicious environment variables.</description>
                <pubDate>Wed, 24 Jun 2020 07:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/env/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/env/</guid>
                
                <category>environment variables</category>
                
                <category>linux</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Are you winning if you&apos;re pinning?</title>
                <author>elttam - Mykel Pritchard</author>
                <description>This blog post takes a brief look at TLS and certificate pinning, the problem of trust in Certificate Authorities that pinning attempts to address, and discusses whether the lack of certificate pinning in a mobile application constitutes a vulnerability.</description>
                <pubDate>Thu, 24 Jan 2019 06:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/certpinning/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/certpinning/</guid>
                
                <category>mobile</category>
                
                <category>TLS</category>
                
                <category>certificate pinning</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Ruby 2.x Universal RCE Deserialization Gadget Chain</title>
                <author>elttam - Luke Jahnke</author>
                <description>This blog post details exploitation of arbitrary deserialization for the Ruby programming language and releases the first public universal gadget chain to achieve arbitrary command execution for Ruby 2.x.</description>
                <pubDate>Thu, 08 Nov 2018 06:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/ruby-deserialization/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/ruby-deserialization/</guid>
                
                <category>ruby</category>
                
                <category>deserialization</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Fuze Multi-Card Technology Security Review</title>
                <author>elttam - Mykel Pritchard</author>
                <description>Reviewing the security of the Fuze card device revealed no trust boundary between the card and the connecting device, which allowed complete access to the Fuze card&apos;s settings and stored credit-card information.</description>
                <pubDate>Tue, 24 Apr 2018 07:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/fuzereview/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/fuzereview/</guid>
                
                <category>mobile</category>
                
                <category>bluetooth</category>
                
                <category>embedded device</category>
                
                <category>code review</category>
                
                <category>reversing</category>
                
                <category>exploitation</category>
                
                <category>poc</category>
                
                <category>CVE-2018-9119</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Remote LD_PRELOAD Exploitation</title>
                <author>elttam - dan</author>
                <description>Analysing a vulnerability in all versions of the GoAhead web server &lt; 3.6.5 that allowed for reliable remote code execution via LD_PRELOAD injection.</description>
                <pubDate>Mon, 18 Dec 2017 06:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/goahead/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/goahead/</guid>
                
                <category>exploitation</category>
                
                <category>code review</category>
                
                <category>CVE-2017-17562</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Building Hardened Docker Images from Scratch with Kubler</title>
                <author>elttam - berne</author>
                <description>How to use Kubler to build hardened, minimalistic, Docker Images from scratch for better security</description>
                <pubDate>Thu, 16 Nov 2017 06:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/kubler/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/kubler/</guid>
                
                <category>docker</category>
                
                <category>kubler</category>
                
                <category>devops</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Intro to SDR and RF Signal Analysis</title>
                <author>elttam - Mykel Pritchard</author>
                <description>We take a brief look into Radio Frequency (RF) theory, Software Defined Radio (SDR), and visual analysis of various RF signal characteristics. We discover a good methodology for reversing RF signals, along with some simple analysis of some common RF remote devices that might be found around the home.</description>
                <pubDate>Thu, 15 Jun 2017 07:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/intro-sdr-and-rf-analysis/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/intro-sdr-and-rf-analysis/</guid>
                
                <category>SDR</category>
                
                <category>RF</category>
                
                <category>reversing</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Playing with canaries</title>
                <author>elttam - hugsy</author>
                <description>Analysis of compiler stack canaries and their implementation across various architectures.</description>
                <pubDate>Tue, 24 Jan 2017 06:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/playing-with-canaries/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/playing-with-canaries/</guid>
                
                <category>mitigations</category>
                
                <category>reversing</category>
                
                <category>exploitation</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>EFF secure messaging scorecard review</title>
                <author>elttam - mattdan</author>
                <description>We decided to audit libotr to gauge its general maturity. This post shares some of our work from the audit, and also some recommendations for software security relevant to the EFF Secure IM Scorecard work.</description>
                <pubDate>Thu, 11 Aug 2016 07:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/a-review-of-the-eff-secure-messaging-scorecard-pt2/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/a-review-of-the-eff-secure-messaging-scorecard-pt2/</guid>
                
                <category>eff</category>
                
                <category>code review</category>
                
                <category>exploitation</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Vuln research on the WAG54G home router</title>
                <author>elttam - daniel</author>
                <description>Journey of hunting for bugs in the WAG54G routers http daemon. The end goal of this research is to find a way to remotely flash C&amp;amp;C firmware (pre-auth), while learning a thing or two along the way... hey, we&apos;d never actually touched MIPS assembly before this!</description>
                <pubDate>Thu, 02 Jun 2016 00:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/vuln-research-on-the-wag54g-home-router/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/vuln-research-on-the-wag54g-home-router/</guid>
                
                <category>hardware hacking</category>
                
                <category>reversing</category>
                
                <category>exploitation</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>A review of the EFF secure messaging scorecard...</title>
                <author>elttam - mattdan</author>
                <description>First part in a series of reviews against IM clients promoted by the EFF secure messaging scorecard, drawing from real examples to demonstrate the dependency between privacy and security. Findings have been patched in the latest release of RetroShare.</description>
                <pubDate>Wed, 03 Feb 2016 06:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/a-review-of-the-eff-secure-messaging-scorecard-pt1/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/a-review-of-the-eff-secure-messaging-scorecard-pt1/</guid>
                
                <category>eff</category>
                
                <category>code review</category>
                
                <category>exploitation</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Gaining console access to the WAG54G home router</title>
                <author>elttam - daniel</author>
                <description>Illustrated guide on identifying and interfacing with the serial pinout exposed on the Linksys WAG54G home router, useful for debugging and exploit dev.</description>
                <pubDate>Wed, 16 Dec 2015 00:00:00 -0600</pubDate>
                <link>https://www.elttam.com/blog/gaining-console-access-to-the-WAG54G-home-router/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/gaining-console-access-to-the-WAG54G-home-router/</guid>
                
                <category>hardware hacking</category>
                
                <category>reversing</category>
                
                <category>exploitation</category>
                
                
                <category>blog</category>
                
            </item>
        
            <item>
                <title>Why I recommend Chrome to family...</title>
                <author>elttam - matt</author>
                <description>An analysis of the browser threat landscape and reasoning about browser security for the family user.</description>
                <pubDate>Tue, 08 Sep 2015 07:00:00 -0500</pubDate>
                <link>https://www.elttam.com/blog/why-i-recommend-chrome/</link>
                <guid isPermaLink="true">https://www.elttam.com/blog/why-i-recommend-chrome/</guid>
                
                <category>general</category>
                
                
                <category>blog</category>
                
            </item>
        
    </channel>
</rss>