2024
Phantom in the Kernel: Exploiting Netfilter for Reliable LPE
Featured
Technical walkthrough of CVE-2024-9680 analysis methodology — from fuzzing-induced discovery to a weaponized, reliable local privilege escalation exploit targeting Linux 6.x kernels.
Defeating ATM Disk Encryption: Where's the Money
Full attack chain against modern ATM disk encryption — bypassing cold-boot protections, extracting keys from volatile memory, and defeating FDE implementations in production cash-handling systems. Covered firmware extraction techniques, unattended key management flaws, and the physical attack surface that survives software hardening. Concluded with responsible disclosure findings and recommendations for hardened boot architectures.
Jackpotting the Snack Aisle: Exploiting Next-Gen Vending Machines
Security analysis of networked vending machines running embedded Linux and Windows IoT — from unauthenticated cashless payment APIs to remote code execution via unpatched telemetry agents. Demonstrated full compromise of MDB (Multi-Drop Bus) payment interfaces, manipulation of product pricing logic, and persistent implants surviving reboot cycles. Findings cover 5+ major vending platforms and responsible disclosure outcomes with vendors.
Weaponising JWT: Algorithm Confusion at Scale
Systematic analysis of JWT library implementations across 40+ major frameworks, revealing authentication bypass vulnerabilities in production SSO deployments.