Movatterモバイル変換


[0]ホーム

URL:


STM logo
Research & Development
$#

Android-based PAX POS vulnerabilities (Part 1)

Authors:Adam Kliś,Hubert Jasudowicz, 15.01.2024

STM Cyber R&D team decided to reverse engineer POS devices made by the worldwide known company PAX Technology, as they are being rapidly deployed in Poland. In this article, we present technical details of 6 vulnerabilities, which were assigned CVEs

Read more...

Microsoft Teams reply spoofing: Trolling your friends and colleagues

Authors:Jan Czerlunczakiewicz,Szymon Jacek, 27.09.2023

Earlier this year, we discovered an interesting behavior in Microsoft Teams chat functionality that allowed us to phish our coworkers and earn a free pizza.

By modifying the request it’s possible to change various parameters of the message we’re replying to, i.e., its content, time of creation, and author.

Read more...

How to get a heart attack while using JEB decompiler

Author:Anonymous Duck, 15.09.2022

Once upon a time, we had to reverse engineer an Android application. To do that, we've decided to use our favorite tool of choice - JEB. All was good until we noticed something suspicious…

The story about finding RCE in the JEB decompiler.

Read more...

@Hack CTF - impressions and ENIPTX (RE 500) writeup

Author:Adam Kliś, 19.01.2022

Recently p4 team (which includes a few of our coworkers) was invited to play the @Hack CTF Final - stationary CTF organized during @Hack conference in the capital of Saudi Arabia - Riyad. Here you can read about our impressions of the CTF and the writeup for one of the reverse engineering challenges - ENIPTX.

Read more...

PowerShell script, Unicode quotes and ウィンドウズ - a story of uncommon command injection

Author:Krzysztof Andrusiak, 14.09.2021

Can you see the difference between " and “ or ' and ‘ ? You can? You've got sharp eyes! Well, PowerShell can't see it. Now, imagine an application which inserts user-provided input into string in dynamically generated PowerShell script while sanitizing only "typical" quotes... Sounds like trouble? RCE handed on a silver platter? But hold your horses, it's not that easy!

Read more...

BoobSnail - Excel 4.0 macro generator

Author:Marcin Ogorzelski, 25.05.2021

Excel 4.0 XLM macros are useful for the Red Team. But it is often the case that when using publicly available generators, samples are detected. Then you usually have to invent your own techniques or modify existing ones. Another problem is the Excel language. If the target's Excel is set to a language other than […]

Read more...

The first step in Excel 4.0 for Red Team

Author:Marcin Ogorzelski, 16.04.2021

As Excel 4.0 is becoming more popular, more and more attackers use it in phishing campaigns. In this blog post, we will dive into the topic of Excel 4.0 macros and learn about techniques that are useful during Red Team and analysis. Additionally, we will present to you our new tool that will assist you […]

Read more...

[8]ページ先頭

©2009-2025 Movatter.jp