Reverse Engineering

QR Codes You Shouldn't Scan

Aug 6, 2025 · 8 mins read

Number 3 may surprise you! I’m kidding of course, blatant web-based phishing attacks are boring. This blog isn’t about those. Most of these examples will probably surprise you in some way. This blog is about the spiraling mess of URI handlers, auth flows, proof-of-presence, and the complete lack of fuzzed code coverage of the ecosystem as a whole.

Exploiting Erlang OTP With Zip Files: CVE-2025-4748

Jun 17, 2025 · EXTERNAL LINK

There’s a new Erlang OTP vulnerability, CVE-2025-4748. It’s an Absolute Path Traversal vulnerability involving a Zip archive, which I have a lot of practice with. It affects Erlang OTP, which a coworker has already written about recently and noted the necessary steps to set up an environment.

Ghidra Is Best: Android Reverse Engineering

Jun 12, 2025 · 6 mins read

Ghidra is the best Android app RE tool. It just seems like it’s not, because the loader has easily fixed quirks. Let me demonstrate.

AyySSHush: Tradecraft of an Emergent ASUS Botnet

May 28, 2025 · EXTERNAL LINK

Using an AI powered network traffic analysis tool we built called SIFT, GreyNoise has caught multiple anomalous network payloads with zero-effort that are attempting to disable TrendMicro security features in ASUS routers, then exploit vulnerabilities and novel tradecraft in ASUS AiProtection features on those routers.

Graph Theory for Reverse Engineers

May 15, 2025 · 8 mins read

Or “everything actually is a nail, you just need a bigger hammer” Graph Theory is a really neat subject matter relating to the modeling of pairwise relations between objects. When you understand graph theory, everything steadily becomes a graph theory problem, because pretty much anything can be.

Step One: How2 Z3

Apr 4, 2025 · 8 mins read

This article is a long time coming. z3, the constraint solver, is commonly used in crackmes and CTF challenges. Wherever possible, I just lift to angr for symbolic execution and bruteforce that way, since z3 is basically math bruteforce anyways. Regardless:

Binary Ninja IOS App Reversing

Jan 20, 2025 · 2 mins read

Recently I ran into a headache of Out-Of-Memory errors when using Binary Ninja. Specifically, this was in relation to dissassembling a Mach-O aarch64 binary from an iOS app grabbed from decrypt.day.

The Xiaohongshu 小红书 REDnote 小红书国际版 "Backdoor"

Jan 16, 2025 · 8 mins read

The popular social media app “TikTok” is likely facing an iminent ban in the United States in the coming days. This has resulted in a mass migration to the Chinese app 小红书 (meaning “little red book”), Xiaohongshu, or simply “REDnote”.

GRUB LUKS Bypass and Dump

Nov 27, 2024 · 6 mins read

Recently I needed to get the data off of a LUKS encrypted partition on a Virtual Machine that “wasn’t mine” and I’d never done it before. As you might imagine, a huge headache ensued.

Perma-Vuln: D-Link DIR-859, CVE-2024-0769

Jun 25, 2024 · EXTERNAL LINK

Recently Sift caught an interesting payload. As it turns out, the exploit was CVE-2024-0769, which is now tagged here: D-Link DIR-859 Information Disclosure Attempt .