@quarkslab Profile picture

quarkslab

@quarkslab

Securing every bit of your data

Similar User
REcon photo

@reconmtl

Jonathan Salwan photo

@JonathanSalwan

RET2 Systems photo

@ret2systems

Synacktiv photo

@Synacktiv

Eloi Benoist-Vanderbeken photo

@elvanderb

REhints photo

@REhints

Rolf Rolles photo

@RolfRolles

Axel Souchet photo

@0vercl0k

Tim Blazytko photo

@mr_phrazer

The Triton library photo

@qb_triton

Romain THOMAS photo

@rh0main

`Ivan photo

@Ivanlef0u

Frida photo

@fridadotre

Samuel Groß photo

@5aelo

Vector 35 photo

@vector35

This year we were proud to sponsor @GrehackConf again! We hope you liked our talks and workshops, including an inside look at the MIFARE Classic smart card backdoor by @doegox and the upcoming Kerberos exploitation workshop by Rayan. 💪#GreHack2024

Tweet Image 1

Sacre BLE! Fuzzing Bluetooth Low Energy GATT and annoying your colleagues for fun and silence Let Baptiste Boyer show you the way blog.quarkslab.com/bluetooth-low-…

Tweet Image 1

quarkslab Reposted

Are you ready to brainstorm at #hw_ioNL2024? Organized by @quarkslab, Hardware CTF is your chance to test your knowledge, learn from fellow enthusiasts, and win amazing prices! RFID 📡 Bluetooth 📶 Automotive 🚗 3D 🖨️ (De)Soldering🔥 Radio 📻 Know More: hardwear.io/netherlands-20…

Tweet Image 1

Our 2024-2025 internships season has started Check out the 3 new openings and apply for fun and knowledge! (paid internships, fur coats not included) blog.quarkslab.com/internship-off…

Tweet Image 1

Linux kernel instrumentation from Qemu and gdb: A technique to analyze binaries or kernel modules that may try to monitor themselves. In this blog post Professor @Mad5quirrel explains the trick blog.quarkslab.com/linux-kernel-i…

Tweet Image 1

We are proud to sponsor the 1st edition of the HackHer Challenge, a CTF competition dedicated to female students and professionals, with the mission of promoting diversity. This Saturday October 19th 10:00 to 18:00 Details and registration here: hackher-challenge.com

Tweet Image 1

Finding and chaining 4 vulns to exfiltrate encryption keys from the Android Keystore on Samsung series A* devices. Did you miss the "Attacking the Samsung Galaxy A* Boot Chain" talk by @max_r_b and Raphaël Neveu earlier this year ? Talk && PoC || GTFO: blog.quarkslab.com/attacking-the-…

Tweet Image 1

Don't you miss the golden era of SQL injections? Here Mathieu Farrell (@coiffeur0x90) explains how to feel the thrill again with the aid of Apache Superset, XML and a bit of parsing tickery: "Bypass Apache Superset restrictions to perform SQL injections" blog.quarkslab.com/bypass-apache-…

Tweet Image 1

Mathieu Farrell (@coiffeur0x90) discovered a dylib injection vulnerability in Microsoft Teams on MacOS. The bug allows an attacker to secretly spy on users through their microphone and camera. Here he explains how he identified and exploited it: blog.quarkslab.com/exploiting-mic…

Tweet Image 1

The Cryptodifference Engine: An in-depth look at differential fuzzing for harvesting crypto bugs, by Célian Glénaz blog.quarkslab.com/differential-f…

Tweet Image 1

quarkslab Reposted

📢 Final of the C&ESAR by DGA: Places are limited 😉! Philippe Teuwen from @quarkslab will discuss vulnerabilities in some MIFARE Classic cards, shedding light on some current hardware supply chain concerns. 👉 european-cyber-week.eu/inscriptions

Tweet Image 1

Dive into crypto-condor, our open-source test suite for cryptographic primitives by Julio Loayza Meneses! Perfect for ensuring compliance & correctness in your implementations. Let's secure your cryptography together! blog.quarkslab.com/crypto-condor-… #cryptography

Tweet Image 1

Chamilo is an open source e-Learning platform written in PHP and used worldwide. During a red team engagement Quarkslab's engineer Mathieu Farrell learned how to exploit it for Remote Code Execution. Now you can too: blog.quarkslab.com/exploiting-cha…

Tweet Image 1

Operator Fabric is an open source platform built by the @LFE_Foundation for use in electricity, water and other utility operations Last May we did a security audit sponsored by @OSTIFofficial🙏 Read a summary of our findings and find the full report here: blog.quarkslab.com/audit-of-opera…

Tweet Image 1

Come to see our automotive security expert @phil_barr3tt on stage at @_barbhack_, twice! As proud sponsors, we have a couple of tickets to offer. You are student? Send us a small motivated email to contact at quarkslab com before tomorrow 15:00 CEST and we'll make a choice.

Tweet Image 1

In June 2024, Quarkslab engineers Turt and @zigtur audited the DeFi product developed by Airswift that "optimizes funds flow" between buyers and suppliers. We would like to thank the Stellar Development Foundation for supporting this project. Report here: blog.quarkslab.com/airswift-scf-s…

Tweet Image 1

quarkslab Reposted

Chinese Backdoor Alert! Security enhancements on Mifare Classic cards used in hotels/business contain a supply chain backdoor making reading & exploitation trivial. Great paper by Philippe Teuwen Quarkslab eprint.iacr.org/2024/1275.pdf Watch your Chinese supply chains carefully folks!


Are "MIFARE-compatible" contactless cards not playing fair? That's what you may wonder after @doegox spotted some odd behavior. Curiosity led to experiments to devise a new attack technique that uncovered some backdoors. The RFID hacking spirit lives on! blog.quarkslab.com/mifare-classic…

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.