TUTORIAL: How to use VHDL with the Alhambra II FPGA

The Alhambra II FPGA is a very compact and powerful FPGA designed in Spain. It is completely programmable using Verilog / SystemVerilog with open source and libre toolchains. However, there is little information about programming it using VHDL. Let me tell you, it is utterly possible, and there is manufacturer…

0 Comments

Interviewing the legendary composer, Martin O’Donnell

Martin (Marty) O’Donnell is one of the men behind the legendary soundtracks of the Halo and Destiny franchises, among others. Recently, I had the opportunity to interview him and ask some questions. Here they are, enjoy! Pedro: Welcome Marty, it’s a pleasure for me to ask these questions to you today. Tell us about your…

0 Comments

C1b3rwall Academy 2020: Introduction to ARM exploit development

2020 has been an exceptional year. The worlwide pandemic caused by Covid-19 caused many conferences and events transition to the online or virtual format. That was C1b3rwall Academy 2020 case, the cybersecurity training program by the Spanish National Police Force. From LibreLabUCM, the free software and cybersecuirty student club from Universidad Complutense, we…

0 Comments

Hacking the 3DS 5, Part 1

Everything comes to an end, and so does the 3DS series. In this first part I’ll pave the way to go through the whole exploit chain that leads to native code execution in the ARM11 and ARM9 processors of the Nintendo 3DS. A successful example of black-box hacking, reversing and…

0 Comments

Is safe design being taught at Computer Engineering degrees?

The definitive question about cybersecurity As a third year student of Computer Engineering at a known University in Madrid and an information secuirty enthusiast, I can’t help but panic when the subject is taught incorrectly or misleadingly. Needless to say, progress has been made in the last years. We have a course…

0 Comments

Solving rhme fiesta from Riscure Hardware CTF 2016 with EM Fault Injection

Abstract Let’s see how to solve the “Fiesta” challenge from Riscure Embedded Hardware CTF 2016 using electromagnetic Fault Injection. This challenge has some lore/story behind, and is specifically designed to be solved using Fault Injection techniques. Tools To solve the challenge I use exclusively my own Electromagnetic Fault Injector Challenge and…

0 Comments

Dirt cheap Electromagnetic Fault Injection

Abstract Today’s post will cover the theory and crafting of an Electromagnetic Fault Injection device for as little as $5. ¿What is Fault Injection? Fault injection is a term widely used in the hardware and systems security scene. It is the act of introducing logic errors (software errors) into CPUs by altering…

0 Comments

Advanced Ghidra Loader: labels, overlays, Function ID

Foundation Last month we saw the basics of a Ghidra Loader, a type of extension for Ghidra. Now we’ll see some additional features to step up the functionality, usability and quality of our loader. I will cover these features in increasing complexity order. Labels Often when working with embedded systems…

0 Comments

Tutorial: Writing a Ghidra loader

Introduction All aboard the reversing train! It’s april 2020 and the whole world has slowed down due to COVID-19. I figured this is a good oportunity to keep learning. Since I’m trying to move on from paid software reverse-engineering ,I started to embrace free and open-sourced alternatives.This would be decent…

0 Comments

Exploiting Ikariam: Persistent XSS and weaponization WriteUp

DISCLAIMER: EVERYTHING IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGE OR OTHER LIABILITY. This is a writeup for a serious vulnerability I found on the popular web and mobile game Ikariam Game Analysis 🔍 Ikariam…

0 Comments