Articles on hacking, reverse engineering, and software development.

  1. On every Apple device are a group of offline classification models that classify images across a number of categories, including safety. While focusing on the SafetyNetLight model, we also discover SceneNetv5, which is a parent model that produces embeddings for scene classification (1,374 categories), entity recognition (7,287 categories), safety classification, object detection, saliency, aesthetics, and fingerprinting.

  2. Using ICANN zone files, we can search all active domains for fraudulent sites that have a similar domain and look-and-feel of legitimate products they're trying to copy. These fake sites offer downloads to software that look real, but have malware attached. In this article, we'll look at a fake Quickbooks site offering a download which contains the infamous Redline Stealer.

  3. Using simple hardware and software, this post will show you how to extract and analyze the firmware of a GL.iNet GL-B1300 router. Identifying UART pins and connecting a JTAGulator will allow us to transmit and receive through the serial connection, access the U-Boot bootloader, and get a root shell on the main filesystem, allowing us to extract the firmware from memory.