Articles on hacking, reverse engineering, and software development.

  1. Every Apple device has a group of offline neural network models that perform various offline classification tasks. In this post, we reverse engineer one of their safety models, SafetyNetLight, and discover a parent model, SceneNetv5, which produces embeddings for scene classification, entity recognition, safety classification, object detection, and more.

  2. Using ICANN zone files, we can search all active domains for fraudulent sites that have a similar domain and look-and-feel of legitimate products they're trying to copy. These fake sites offer downloads to software that look real, but have malware attached. In this article, we'll look at a fake Quickbooks site offering a download which contains the infamous Redline Stealer.

  3. Using simple hardware and software, this post will show you how to extract and analyze the firmware of a GL.iNet GL-B1300 router. Identifying UART pins and connecting a JTAGulator will allow us to transmit and receive through the serial connection, access the U-Boot bootloader, and get a root shell on the main filesystem, allowing us to extract the firmware from memory.