Neodyme's Avatar

Neodyme

@neodyme.io

We secure software with deep-dive audits, cutting-edge research, and in-depth trainings.

45
Followers
1
Following
36
Posts
29.11.2024
Joined
Posts Following

Latest posts by Neodyme @neodyme.io

Preview
Drone Hacking Part 1: Dumping Firmware and Bruteforcing ECC Desoldering a drone's flash chip and reconstructing the firmware from broken data.

Drones are hot - their security is not.
Here is how removed the NAND, dumped firmware, and reverse-engineered ECC on a consumer drone. Stay tuned for part 2!
neodyme.io/de/blog/dron...

14.01.2026 12:13 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 1

Thanks to @thezdi.bsky.social for hosting yet another well-run and inspiring Pwn2Own edition!

23.10.2025 16:43 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

Another amazing #Pwn2Own in the books! πŸ’ͺ
Our team pulled off some great hacks:
πŸ–¨οΈ HP Printer β€” $20K / 2 MoP
🏠 Home Assistant β€” $15K / 3 MoP
πŸ”Œ Smart Plug β€” $20K / 2 MoP
πŸ“Έ Canon β€” $10K / 2 MoP
Total: $65K / 9 MoP
So proud of what we achieved together! 🧠⚑

23.10.2025 16:42 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Post image Post image

Verified! Team @neodyme.io used a single integer overflow to exploit the Canon imageCLASS MF654Cdw. Their unique bugs earns them $10,000 for the 8th round win and 2 Master of Pwn points. #Pwn2Own

23.10.2025 13:56 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Diving into the depths of Widevine L3 This post explores various approaches to attacking Widevine L3, a DRM system commonly used by streaming services. We analyzed the Android library and instrumented it dynamically to extract the keybox ...

Check out our new blog post on a research-driven look at software-only DRM. Explore how the Qiling emulation framework can be used to analyze Widevine and how Differential Fault Analysis (DFA) and emulation aid de-obfuscation.
▢️ Read more: neodyme.io/en/blog/wide...

23.10.2025 12:12 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 1

πŸ–¨οΈ Print victory! Team @neodyme.io just hacked the Canon imageCLASS MF654Cdw at #Pwn2Own. They head off to the disclosure room once more to provide the details of their exploit. #P2OIreland

23.10.2025 11:36 πŸ‘ 5 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Confirmed! Team @neodyme.io used three bugs to exploit the Amazon Smart plug. In doing so, they earn themselves $20,000 and 2 Master of Pwn points. #Pwn2Own

22.10.2025 17:15 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Success! We had a little configuration confusion, but Team Neodyme hopped for joy as their exploit of the Amazon Smart Plug was successful. Their attack went over Bluetooth & WiFI, so they used the RF enclosure. They head off to the disclosure room with details. #Pwn2Own

22.10.2025 14:45 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
From Pwn2Own Ireland 2025: NEODYME VS HP
From Pwn2Own Ireland 2025: NEODYME VS HP YouTube video by Trend Zero Day Initiative

Shout-out to our colleagues at #Pwn2Own in Cork: www.youtube.com/watch?v=e20D...

22.10.2025 13:23 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

πŸ“’ Confirmed: Team Neodyme used 2 bugs to exploit the Home Assistant Green, but only 1 was unique. They still earn $15,000 and 3 Master of Pwn points. #Pwn2Own

22.10.2025 12:21 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

🏠 Well that was quick. Team Neodyme needed only one second to demonstrate their exploit of the Home Automation Green. We know they took their time creating the exploit, but wasted no time showing it off. The head off to the disclosure room to dish the deets. #Pwn2Own

22.10.2025 10:46 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Pwn2Own Ireland 2024: QNAP Qhora-322 In 2024, we competed as team Neodyme in the Pwn2Own Ireland contest, targeting the "SOHO Smashup" category and all available printers. For our entry, we focused on the QNAP QHora-322 router, successfu...

While our colleagues hack live at #Pwn2Own in Cork, take a look at our newly published last year's writeup on our blog: We compromised a QNAP router to take over a networked Canon printer.
▢️ Read the findings and how we got there: neodyme.io/en/blog/pwn2...

21.10.2025 12:40 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Our first confirmation of #Pwn2Own Ireland is in! Team Neodyme used a stack based buffer overflow to exploit the HP DeskJet 2855e. They earn $20,000 and 2 Master of Pwn points. #P2OIreland

21.10.2025 09:21 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Agenda Agenda - Hack.lu and CTI summit 2025

Heading to #hack_lu? πŸ”
Our colleague Felipe will discuss how partial emulation and DFA can be used to study a legacy version of Widevine L3, Google's software-based DRM.
➑️ Dive into the past to strengthen future DRM security.

πŸ—“οΈ Oct 23 at 2:15pm
2025.hack.lu/agenda/

17.10.2025 15:53 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Lenovo DCC: Part 1 - A simple ACL Exploit The Lenovo Display Control Center (DCC), widely deployed in Windows enterprise environments, contained a critical local privilege escalation vulnerability enabling unauthorized elevation to administra...

⚑️ Lenovo DCC contained an easy-to-exploit LPE: a weak ACL bug β†’ local privilege escalation β†’ full admin πŸ–₯οΈπŸ‘¨β€πŸ’»
We break it down with reverse engineering, process tracing, & two exploit strategies. Read Part 1 of our deep dive: πŸ‘‰ neodyme.io/de/blog/leno...

01.10.2025 14:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Building Our Own Post-Quantum FIDO Token We have built our own FIDO2 token based on post-quantum crypto. Here is how.

▢️ We built a proof-of-concept post-quantum FIDO authenticator. It's phishing- AND quantum-resistant.
βœ…οΈ Bonus: it even outperforms Google's prototype. πŸ‘€
Full write-up here: neodyme.io/en/blog/pqc-...

16.09.2025 13:46 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

β˜€οΈ Teamwork doesn't just happen at the desk. This week, our crew is in Mallorca, building ideas, strengthening bonds, and enjoying some well-deserved sunshine together. 🌴

Great collaboration comes from trust, connection, and a shared good vibe ✨

05.09.2025 15:20 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Back from @blackhatevents.bsky.social & @defcon.bsky.social! πŸŽ‰
Our colleagues delivered insightful trainings on crypto hacking and binary exploitation and got amazing feedback from the crowd πŸ™Œ
Missed it? We offer tailored security trainings for companies too. Just reach out.

13.08.2025 07:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
CVE-2025-6812 β€’ Parallels Client Local Privilege Escalation Vulnerability The AppServer service installed with Parallel Client searches for an OpenSSL config file in an unsecured location, which allowed low privileged users to escalate their privileges.

We reported a vulnerability in Parallels Client via the ZDI last year.
πŸ”₯ The issue (CVE-2025-6812) - now fixed: A privileged service searched for an OpenSSL config file in an unsecured location, enabling LPE.
➑️ Advisory here: neodyme.io/en/advisorie...
β˜‚οΈ Patch your systems!

25.07.2025 09:01 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

πŸ”§βœ¨ On our company retreat this week, we're diving into hardware and protocol hacking: fingerprint sensors, smart locks, drones and Bluetooth speakers. A great mix of hands-on research, creative exploration, and team bonding over board games! 🎲

10.07.2025 10:08 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

🎀At 4pm today at the "Festival der Zukunft", our colleagues dive into:
"Black Hat, White Hat, Cyberwar - Modern Attacks and Defense"

From hacking-as-a-service to cyberwarfare, discover how attacks are evolving and what it means for digital defense.
πŸ•΅οΈβ€β™€οΈ Don't miss it!

03.07.2025 07:47 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Did You Train on My Voice? Exploring Privacy Risks in ASR This post explores a recent research paper on membership inference attacks targeting Automatic Speech Recognition (ASR) models. It breaks down how subtle signals like input perturbation and model loss...

Think your speech model is secure?
It might be quietly leaking what it was trained on.

In a new blog post, we explain membership inference attacks and why they matter for cyber security experts.
πŸ”— neodyme.io/en/blog/memb...

02.07.2025 14:03 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

Meet our colleagues at the "Festival der Zukunft" at Deutsches Museum in Munich. Don't miss our talk on July 3 at 4pm!
Check it out here: www.1e9.community/festival-der...

23.06.2025 10:39 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Your router might be a security nightmare: Tales from Pwn2Own Toronto 2022 Three years ago, Neodyme took aim the "SOHO Smashup" category at Pwn2Own Toronto 2022, targeting a Netgear RAX30 router and an HP M479fdw printer. We successfully gained remote code execution on both ...

πŸ† Throwback to #Pwn2Own Toronto 2022: "Routers are just Linux boxes with antennas." So we treated one like it. At #Pwn2Own 2022, we turned a Netgear RAX30 into a stepping stone for a full LAN pivot. Story: neodyme.io/en/blog/pwn2...

06.06.2025 16:08 πŸ‘ 4 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Riverguard: Mutation Rules for Finding Vulnerabilities Riverguard, the first line of defense for all Solana contracts

Part 3 of our Riverguard series is out!
We're looking under the hood at the "fuzzcases" Riverguard uses to catch real-world bugs in Solana smart contracts.
Still shocked how often some of these pop up.
Check it out πŸ‘‰ neodyme.io/en/blog/rive...

28.05.2025 15:13 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Once again this year, a few colleagues couldn’t resist jumping into the HTB CTF to take on experts from around the world. πŸ’»
A great challenge with a wide range of categories.
The result: 1st place in πŸ‡©πŸ‡ͺ and top 3 in πŸ‡ͺπŸ‡Ί.

28.05.2025 10:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Pwn2Own Ireland 2024: Canon imageCLASS MF656Cdw This blogpost starts a series about various exploits at Pwn2Own 2024 Ireland (Cork). This and the upcoming posts will detail our research methodology and journey in exploiting different devices. We st...

At #Pwn2Own Ireland 2024, we successfully targeted the SOHO Smashup category. πŸ–¨οΈ
Starting with a QNAP QHora-322 NAS, we pivoted to the Canon imageCLASS MF656Cdw - and ended up with shellcode execution.
Read the full vulnerability deep dive here πŸ‘‰ neodyme.io/en/blog/pwn2...

22.05.2025 11:06 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Day 2 at OffensiveCon has just started and our colleagues Kolja Grassmann and Alain RΓΆdel are right in the middle of it! πŸ”₯
Can't wait to hear the insights they bring back from some of the sharpest minds in offensive security. If you're there too, make sure to say hi!

17.05.2025 08:49 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
HTML to PDF Renderer: A tale of local file access and shellcode execution In a recent engagement, we found an HTML to PDF converter API endpoint that allowed us to list local directories and files on a remote server. One of the PDF files we created, revealed that the conver...

From iframes and file reads to full RCE. πŸ”₯

We found an HTML-to-PDF API allowing file reads and SSRF - then chained it into remote code execution via a Chromium 62 WebView exploit.

πŸ‘‰ Read the full write-up here: neodyme.io/en/blog/html...

02.05.2025 11:03 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
Kolja and Felipe - Binary Exploitation on Windows - DCTLV2025 **4-Day Training** **Please note: This is a four-day training that will be held Saturday-Tuesday (August 9-12). Participants will receive DEF CON Human Badge with their registration** Name of Training: Binary Exploitati...

Sign up here: training.defcon.org/collections/...

29.04.2025 07:53 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0