Toggle menu
Research 19 October 2019
ClickToPray eRosary Account Takeover

Exploiting the eRosary Application In this post we’re going to cover a trivial full account takeover vulnerability our team identified within the new eRosary application, whilst placing an order for the watch! The ClickToPray eRosary beads are advertised as ‘an interactive, smart and app-driven device that serves as a tool for learning how to pray […]

Research 10 May 2019
Exploiting 10,000+ devices used by Britain’s most vulnerable

In this post, we’re going to detail some of the issues our team identified with the an extremely common Alarm & GPS device used by vulnerable people around the world (at least 10,000+ in the UK). The device in question is manufactured in China and seems to be purchased in bulk by numerous providers who […]

Research 29 April 2019
A Primer on Widevine and How It Can Be Abused to Download Encrypted Movies/Shows

First things first, what is Widevine? Widevine is an encryption framework that is used for digital rights management (DRM). It’s owned by Google, but used by a huge array of content creators and streaming services, on account of it being royalty free to use and implement. With 5 billion devices shipped that support it and […]

Research 16 April 2019
Dude, Where’s My Car?

Keyless Car Theft 101 The Low-Down Traditionally, cars were secured using a mechanical lock and a key. Car thieves would be able to circumvent this in a number of ways, including picking the lock, smashing a window, hotwiring the car and using tools to unlock the car from the inside. New breakthroughs in car technology […]

Research 27 April 2018
DLink DCS-5020L Day n’ Night Camera Remote Code Execution Walkthrough

Description “The DCS-5020L Wireless N Day & Night Pan/Tilt Cloud Camera is a day/night network camera that easily connects to your existing home network for remote viewing on a range of mobile devices. It features pan, tilt and digital zoom function to allow you to see a wider area with a single camera, built-in Wi-Fi […]

Research 26 April 2018
TPLink TLWR740n Router Remote Code Execution

Introduction In October of 2017 we disclosed multiple vulnerabilities in TP-Link’s WR940n router that occurred due to multiple code paths calling strcpy on user controllable unsanitised input (CVE-2017-13772) The httpd binary responsible for these vulnerabilities contained patterns of code that looked similar to the following: At the time of disclosure, there were around 7000 of […]

Research 25 April 2018
Suspicious Activity Is Being Detected?… Right?…

Introduction A few days ago I received a message from a friend who had just had his Deliveroo (food delivery service in the UK) account compromised and someone in London had used it to order a copious amount of food and alcohol; brazen, I know. The interesting part of this story is my friend was […]