Analysis and Solution of an Unexpected Mining Trojan Virus

Analysis and Solution of an Unexpected Mining Trojan Virus

Since I changed my job position, I haven’t researched reverse security for about 4 or 5 years. I thought I would have no connection with this profession again, but unexpectedly, today I had a chance to “enjoy” it again due to a random opportunity. Recently, my colleagues in the company have been constantly reporting that … Read more

Analysis of BLE Communication in Loock Touch Smart Lock

Analysis of BLE Communication in Loock Touch Smart Lock

This article is a featured article from the Kanxue ForumAuthor of Kanxue ForumID: Hu Yimi 1 Introduction In this article, we share some research content about the Loock Touch smart lock, which is produced by Yunding Technology. Yunding Technology is a company focused on the research and production of smart home security products, with two … Read more

A Simple Analysis of STM32 Firmware

A Simple Analysis of STM32 Firmware

This article is a highlight from the Kanxue Forum. Author ID on Kanxue Forum: Shaobanjia After reading the STM32 firmware reverse engineering thread on the forum (https://bbs.pediy.com/thread-272811.htm), I found a help request in the comments about the STM32 chip program that uses the XTEA encryption algorithm, but I couldn’t understand the data sorting issue (https://bbs.pediy.com/thread-272872.htm). … Read more

Attacking Microcontroller Firmware via USB

Attacking Microcontroller Firmware via USB

One Who Hacks Video Game Consoles? The manufacturing of counterfeit and unauthorized products is prevalent in the world of video game consoles. This is a multi-billion dollar industry where demand creates supply. You can now find devices for nearly every existing console that allow you to play licensed video game “backups” from flash drives, counterfeit … Read more

Understanding Tesla Attack Cases: Hardware Reverse Analysis

Understanding Tesla Attack Cases: Hardware Reverse Analysis

This article is an excellent piece from the KXue Forum, author ID: kxliping 1 Purpose of Analyzing Attack Cases The main purpose of studying attack cases is to understand how attackers breach vehicles and take control of them. In the research on Tesla attacks, Tencent’s Keen Lab has contributed several successful cases, which should ideally … Read more

Restoration of APP Encryption and Signature Algorithms

Restoration of APP Encryption and Signature Algorithms

This article is an excellent piece from the KX forum. KX forum author ID: taobluesky Recently encountered a shell with quite high intensity, sharing how to debug with the shell, purely a technical exchange, please do not use this article for illegal purposes! 1 Prepare Environment frida 12.11.18 jeb-3.24 jadx-gui-1.3.3-1 xcube android 7.0 (real machine) … Read more

In-Depth Guide to Assembly Language and Binary Vulnerabilities

In-Depth Guide to Assembly Language and Binary Vulnerabilities

Learning programming has become a headache for many. There are those late nights when I look up at the bright moon, wondering when I can fully grasp assembly language and fulfill my dreams. But reality always hits hard…. There are many moments when I feel like smashing my keyboard, but we, the brave, will not … Read more

Introduction to Assembly Language

Introduction to Assembly Language

Friends with a bit of computer knowledge must know that computers only recognize 0s and 1s. Back in the day, to write a program, one had to use 0s and 1s, haha, cool right? The admiration for programmers likely originated from that time. Later, people found it very inconvenient to write programs using just 0s … Read more

Embedded Security Tool: Practical JTAG Debugging

Embedded Security Tool: Practical JTAG Debugging

He is the “Little Horse” mentioned by TK at the GeekPwn conference in 2015, another alchemist who intruded into the security circle (originally a chemistry major) – HyperChem. After a few years of experience in software unpacking, he is currently focusing on embedded security and firmware reverse engineering. This researcher from Tencent Security’s Xuanwu Lab, … Read more

Introduction to IoT Firmware Vulnerability Research

Introduction to IoT Firmware Vulnerability Research

With the advent of the 5G era, the role of the Internet of Things (IoT) is becoming increasingly important, along with more security risks. IoT security covers a wide range of topics. This series of articles will discuss the author’s understanding of IoT vulnerability research from a technical perspective. The author will explore five dimensions: … Read more