Resources

Research, experimentation, and continuous improvement are fundamental to how we operate at elttam. Our consultants spend a significant amount of time exploring new technologies, building tooling, analysing vulnerabilities, and turning interesting problems encountered in the field into deeper technical investigations.

This section brings together that work - from detailed research posts and vulnerability disclosures to tools, publications, and updates from the team. By sharing what we learn, we aim to contribute back to the security community while pushing our own knowledge and capabilities forward.

Browse by Category

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

By

Zoltan Madarassy
October 3, 2023

Exploring the STSAFE-A110

Using a sample application, this blog post gives a walkthrough of the I2C communication between the STSAFE-A110 secure element and a host MCU. A tool is released to aid in understanding the I2C flow using a logic analyser.

hardware
stsafe-a110
iot
secure element
st32
Read More
Blog Post

By

Victor Kahan
September 6, 2023

RE of LR3

This blog post provides a walk-through of ESP32 firmware extraction and analysis to understand the technical implementation of the Litter Robot 3.

iot
embedded
esp32
esp-idf
xtensa
Read More
Blog Post

By

berne
July 17, 2023

Abusing Amazon VPC CNI plugin for Kubernetes

This blog post covers exploring the Amazon VPC CNI plugin for Kubernetes, and how it can be abused to manipulate networking to expose access to other resources, including in other VPCs.

aws
eks
iam
k8s
cloud
Read More
Blog Post

By

elttam
May 9, 2023

PwnAssistant - Controlling /home's via a Home Assistant RCE

This blog post provides a summary of the Home Assistant architecture, attack surface, and our approach auditing pre-authentication components. This post summarises and links to a few published advisories, including a Critical pre-authentication vulnerability.

web
iot
cve-2023-27482
Read More
Blog Post

By

joseph
February 9, 2023

Cracking the Odd Case of Randomness in Java

This blog post details a technique for breaking Apache Commons Lang's RandomStringUtils and Java's random.nextInt(bound) when the bound is odd. A tool is released which demonstrates the practicality of the attack.

crypto
web
java
rng
Read More
Blog Post

By

Zoltan Madarassy
June 30, 2022

Golang code review notes

This blog post is aimed to help people performing security code reviews on Golang code bases to identify dangerous code patterns.

golang
go
codereview
Read More
Blog Post

By

Daniel Hodson
June 6, 2022

ESP-IDF setup guide

This post is for vulnerability researchers looking at the ESP32 and would like a quick setup guide.

iot
embedded
mcu
esp32
esp-idf
Read More
Blog Post

By

Mykel Pritchard
December 9, 2020

Tuya IoT and EZ Mode Pairing

This blog post aims to highlight how EZ mode pairing implemented by Mirabella Genio and other Tuya Cloud IoT devices broadcast your WiFi credentials to the neighbourhood.

iot
wifi
esp8266
esp8285
tuya
Read More
Blog Post

By

Sebastien Macke
September 25, 2020

Attacks on GCM with Repeated Nonces

This blog post focuses on AES-GCM and the security impact of using the same IV (nonce) to encrypt data to the users of a web application.

crypto
web
Read More
Blog Post

By

Faraz
September 3, 2020

Simple Bugs With Complex Exploits

This blog post details a root cause analysis for Project Zero Issue 2046 found by Sergey Glazunov.

chrome
v8
turbofan
Read More
Blog Post

By

Brendan Scarvell
July 9, 2020

Lua SUID Shells

This blog post explores how privileged Lua scripts can pop shells without dropping privileges.

lua
privilege escalation
linux
Read More
Blog Post

By

Luke Jahnke
June 24, 2020

Hacking with Environment Variables

A look into how scripting language interpreters can execute arbitrary commands when supplied with malicious environment variables.

environment variables
linux
Read More
Blog Post

In the News

What all the fuss is about