Cristian Cantos's Avatar

Cristian Cantos

@kriware

Security Analyst at Layakk
Permanent student
Kriware Security Feed: Feed of technical blogs about cybersecurity. -> Telegram Channel: https://t.me/kriwarefeed
YouTuber: kriware
RootedCON co-organizer

124
Followers
181
Following
148
Posts
10.01.2024
Joined
Posts Following

Latest posts by Cristian Cantos @kriware

Post image

Are you still not part of the EXCLUSIVE hacker community that receives a DAILY TECHNICAL article about hacking?

Every day, practical and advanced knowledge delivered straight to you.

Join now! 👇

06.12.2024 11:50 👍 2 🔁 1 💬 0 📌 1

Chaining Directory Traversal & CSV Parser Abuse for RCE in Django

Combines unsanitized username path traversal with pandas CSV to_csv() quirks to overwrite wsgi.py and gain RCE.

https://jineeshak.github.io/posts/Chaining-Directory-Traversal-and-CSV-Parser-Abuse-for-RCE-in-Django/

#django

20.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Solo: A Pixel 6 Pro Story

Researcher adapts a Mali GPU integer overflow (CVE‑2023‑48409) to root Pixel 6 Pro by adding memory-spraying and SELinux bypasses—all from a single bug.

https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/

#Android

19.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

TapTrap: Invisible Animation‑Driven Tapjacking on Android

A malicious app with zero permissions uses transparent animations to hide real system prompts (e.g., camera, location, admin) and trick users into tapping them unknowingly.

https://taptrap.click/

#Tapjacking #AndroidAttack

18.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

GPUHammer: Rowhammer Attack on NVIDIA GDDR6 GPUs

GPUHammer is the first practical Rowhammer attack on GDDR6 VRAM (e.g., RTX A6000), flipping bits via CUDA and silently corrupting AI models, plummeting accuracy from ~80% to under 1%.

https://gpuhammer.com/

#Rowhammer #GPUAttacks

17.07.2025 19:47 👍 0 🔁 0 💬 0 📌 0

DreamWalkers: Reflective Shellcode Loader with Clean Call Stacks

A loader that achieves believable call stacks in reflectively loaded modules by parsing PE and registering unwind data via RtlAddFunctionTable.

https://maxdcb.github.io/DreamWalkers/

#ShellcodeLoader #CallStackSpoofing

16.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Windows Kernel Pool Internals

Explains kernel pool allocation, PoolTags, segment heap (kLFH, VS, Large), and building a no‑admin tool to enumerate tags.

https://r0keb.github.io/posts/Windows-Kernel-Pool-Internals/

#Kernel #Heap #windows

15.07.2025 05:30 👍 1 🔁 1 💬 0 📌 0

Exploiting WRMSR in Vulnerable Drivers

Detailed guide on abusing unsecured WRMSR IOCTLs to overwrite LSTAR MSR, build ROP chains bypassing SMEP/SMAP/KPTI, and gain kernel execution.

https://idafchev.github.io/blog/wrmsr/

#Kernel #windows

14.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Hexagon Fuzz: Full-System Emulated Fuzzing of Qualcomm Basebands

SRLabs released the first open-source emulator-based fuzzing toolchain for Qualcomm Hexagon baseband firmware

https://www.srlabs.de/blog-post/hexagon-fuzz-full-system-emulated-fuzzing-of-qualcomm-basebands

#Baseband #Fuzzing

13.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Rediscovered an 11‑Year‑Old libpng Vulnerability

A beginner in secure code review reintroduced CVE‑2014‑9495 by fuzzing width * bit-depth overflow

https://blog.himanshuanand.com/posts/discovered-a-libpng-vulnerability-11-years-after-it-was-patched/

#libpng #IntegerOverflow

12.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Resurrecting a Dead Torrent Tracker and Finding 3M Peers

Revived an expired .si tracker domain, launched Opentracker on VPS, and attracted ~1.7M torrents with 3.1M unique peers in just one hour.

https://kianbradley.com/2025/06/15/resurrecting-a-dead-tracker.html

#TorrentTracker

11.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Reliable System Call Interception

Highlights using seccomp_user_notify with BPF for low‑overhead syscall interception, replacing slow ptrace—demoed via “copycat” tool for per‑syscall file redirection.

https://blog.mggross.com/intercepting-syscalls/

#Seccomp #SyscallInterceptor

10.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

VNC Honeypot Setup by James Woolley

Details setting up a VNC honeypot on Ubuntu that logs sessions, records attacker interactions, and captures payloads for monitoring.

https://ja.meswoolley.co.uk/vnc-honeypot/

#VNC #Honeypot

09.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

The Hidden JTAG in Your Qualcomm/Snapdragon Device’s USB Port

A built-in Embedded USB Debug (EUD) interface since ~2018 allows SWD/JTAG access via USB, enabling kernel/U-Boot debugging without external tools.

https://www.linaro.org/blog/hidden-jtag-qualcomm-snapdragon-usb/

#Snapdragon

08.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Implementing Fast TCP Fingerprinting with eBPF

A Golang webserver uses eBPF (XDP + kernel hashmap) to capture TCP SYN options at kernel-level and fingerprint clients efficiently.

https://halb.it/posts/ebpf-fingerprinting-1/

#eBPF #TCPFingerprinting

07.07.2025 05:30 👍 2 🔁 0 💬 0 📌 0

How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets

Using GH Archive & GitHub Event API, Truffle’s tool scans zero‑commit force-pushes since 2020 to find leaked secrets.

https://trufflesecurity.com/blog/guest-post-how-i-scanned-all-of-github-s-oops-commits-for-leaked-secrets

#git

06.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Alice’s Adventures in a Differentiable Wonderland

A friendly primer on differentiable programming and neural nets—covering autodiff, CNNs, RNNs, transformers in PyTorch & JAX.

https://arxiv.org/abs/2404.17625

#NeuralNetwork

05.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Essential C – Stanford CS Education Library

Concise 45‑page guide covering C fundamentals: types, control flow, arrays, pointers, memory, struct, functions, and compilation.

http://cslibrary.stanford.edu/101/

#c #programming

01.07.2025 05:30 👍 0 🔁 0 💬 0 📌 0

TPU Deep Dive

Google’s TPUs use large systolic arrays, scratchpad memory, XLA AoT compilation, and 3D-torus interconnects to deliver exascale AI compute with efficiency.

https://henryhmko.github.io/posts/tpu/tpu.html

#tpu #firmware

30.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Root Shell on Yomani Credit‑Card Terminal

Reverse‑engineered Worldline Yomani XR: found exposed serial console with root shell, bypassed tamper protections via hardware debug port.

https://stefan-gloor.ch/yomani-hack

#terminal

29.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

FileFix – A ClickFix Alternative

Browser trick uses file upload to open File Explorer, copy malicious PowerShell path disguised as a doc, and auto-execute via address bar.

https://mrd0x.com/filefix-clickfix-alternative/

#Phishing

28.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Primitive Injection – Breaking the Status Quo

Project creates reliable read/write/allocate primitives to evade telemetry by enabling custom injection flows and changing process IOCs.

https://trickster0.github.io/posts/Primitive-Injection/

#injection #evasion

27.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

PicoEMP – Low-Cost DIY EMFI Tool

PicoEMP is a budget Electromagnetic Fault Injection (EMFI) device using Raspberry Pi Pico, ideal for hobbyist security research.

https://github.com/newaetech/chipshouter-picoemp

#HardwareHacking

26.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Intercepting Traffic on Android with Mainline and Conscrypt

NVISO explains how Conscrypt updates impacted HTTPS interception and how their AlwaysTrustUserCerts Magisk module now supports A7–A16.

https://blog.nviso.eu/2025/06/05/intercepting-traffic-on-android-with-mainline-and-conscrypt/

#android

24.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Fault Injection – Follow the White Rabbit

Demonstrates EMFI and voltage glitching on ESP32‑V3 to modify flash CRC32 and combine glitch for Secure Boot bypass via complex fault‑injection chain.

https://security.humanativaspa.it/fault-injection-follow-the-white-rabbit/

#EMFI #SecureBootBypass

23.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Make Self‑XSS Great Again

Transforms stored self‑XSS into actual stored XSS using modern credentialless iframes plus CSRF to hijack victim sessions.

https://blog.slonser.info/posts/make-self-xss-great-again/

#web #xss

22.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Funky Chunks: Abusing Chunk Line Terminators for Request Smuggling

Investigates ambiguous chunk-line terminators enabling HTTP request smuggling via non-standard chunk parsing.

https://w4ke.info/2025/06/18/funky-chunks.html

#RequestSmuggling #HTTPParsing

21.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

MCP Security Tips – 5 Risks & Safeguards

NCC Group highlights five MCP security risks: supply-chain, local/remote vulnerabilities, prompt injection, excessive capabilities, and offers practical mitigations.

https://www.nccgroup.com/us/research-blog/5-mcp-security-tips/

#MCP #AI

20.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

Emulating a Bike Sensor with ESP32 BLE

Builds an ESP32-based BLE Cycling Speed & Cadence sensor using a single reed switch to emulate speed and cadence, leveraging the standard CSC BLE profile.

https://eybisi.run/Emulating-a-Bike-Sensor/

#BLE #HardwareHacking

19.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0

PatchGuard Internals – Deep Kernel Protection Dive

Explains PatchGuard’s initialization phases, secure-hypervisor activation paths, and context setup, revealing potential bypass points.

https://r0keb.github.io/posts/PatchGuard-Internals/

#PatchGuard #WindowsKernel

18.06.2025 05:30 👍 0 🔁 0 💬 0 📌 0