Resources

Research, experimentation, and continuous improvement are fundamental to how we operate at elttam. Our consultants spend a significant amount of time exploring new technologies, building tooling, analysing vulnerabilities, and turning interesting problems encountered in the field into deeper technical investigations.

This section brings together that work - from detailed research posts and vulnerability disclosures to tools, publications, and updates from the team. By sharing what we learn, we aim to contribute back to the security community while pushing our own knowledge and capabilities forward.

Browse by Category

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

By

Mykel Pritchard
January 24, 2019

Are you winning if you're pinning?

This blog post takes a brief look at TLS and certificate pinning, the problem of trust in Certificate Authorities that pinning attempts to address.

mobile
TLS
certificate pinning
Read More
Blog Post

By

Luke Jahnke
November 8, 2018

Ruby 2.x Universal RCE Deserialization Gadget Chain

This blog post details exploitation of arbitrary deserialization for the Ruby programming language and releases the first public universal gadget chain.

ruby
deserialization
Read More
Blog Post

By

Mykel Pritchard
April 24, 2018

Fuze Multi-Card Technology Security Review

Reviewing the security of the Fuze card device revealed no trust boundary between the card and the connecting device, allowing access to stored credit-card information.

mobile
bluetooth
embedded device
reversing
exploitation
Read More
Blog Post

By

Daniel Hodson
December 18, 2017

Remote LD_PRELOAD Exploitation

Analysing a vulnerability in all versions of the GoAhead web server < 3.6.5 that allowed for reliable remote code execution via LD_PRELOAD injection.

exploitation
cve-2017-17562
Read More
Blog Post

By

berne
November 16, 2017

Building Hardened Docker Images from Scratch with Kubler

How to use Kubler to build hardened, minimalistic, Docker Images from scratch for better security.

docker
kubler
devops
Read More
Blog Post

By

Mykel Pritchard
June 15, 2017

Intro to SDR and RF Signal Analysis

We take a brief look into Radio Frequency (RF) theory, Software Defined Radio (SDR), and visual analysis of various RF signal characteristics.

SDR
RF
reversing
Read More
Blog Post

By

hugsy
January 24, 2017

Playing with canaries

Analysis of compiler stack canaries and their implementation across various architectures.

mitigations
reversing
exploitation
Read More
Blog Post

By

Matt Jones
and
Daniel Hodson
August 11, 2016

EFF secure messaging scorecard review

We decided to audit libotr to gauge its general maturity. This post shares some of our work from the audit.

eff
exploitation
Read More
Blog Post

By

Daniel Hodson
June 2, 2016

Vuln research on the WAG54G home router

Journey of hunting for bugs in the WAG54G routers http daemon to find a way to remotely flash C&C firmware (pre-auth).

hardware hacking
reversing
exploitation
Read More
Blog Post

By

Matt Jones
and
Daniel Hodson
February 3, 2016

A review of the EFF secure messaging scorecard...

First part in a series of reviews against IM clients promoted by the EFF secure messaging scorecard.

eff
exploitation
Read More
Blog Post

By

Daniel Hodson
December 16, 2015

Gaining console access to the WAG54G home router

Illustrated guide on identifying and interfacing with the serial pinout exposed on the Linksys WAG54G home router, useful for debugging and exploit dev.

hardware hacking
reversing
exploitation
Read More
Blog Post

By

Matt Jones
September 8, 2015

Why I recommend Chrome to family...

An analysis of the browser threat landscape and reasoning about browser security for the family user.

general
Read More
Blog Post

In the News

What all the fuss is about