Labs
Research fromthe team atInterrupt Labs
The team at Interrupt Labs are a clever bunch – here they share their top tips, resources and research around computer security.
Stardew Valley PRNG Seed Cracking
RESOURCES
By
Joseph B
July
2024
This blog post describes the process of reverse engineering the Nintendo Switch version of Stardew Valley to build two tools: Stardew Seed Cracker (a tool to crack the PRNG seed using stock from the Traveling Cart) and Stardew Predictor (a tool to predict future events based on the PRNG seed).
MoreJADX Collaboration
RESOURCES
By
Joseph B
June
2024
This post introduces JADX Collaboration, a plugin for JADX-GUI that allows users to seamlessly share their analysis with one another without ever leaving the program.
MoreBeyond Android MTE: Navigating OEM's Logic Labyrinths
TECH
By
Max VA (@maxpl0it)
May
2024
We're back at Mobile Pwn2Own to show you how logic bugs can be chained to effortlessly pwn the latest Samsung and Xiaomi flagships.
MoreIntegrating Semgrep Analysis with Binary Ninja
RESOURCES
By
Samman P
March
2024
This post outlines a Binary Ninja plugin that we've released to add native support for Semgrep analysis, which was developed during an internship.
MoreNewly Unreachable: The very sad story of a TP-Link bug
TECH
By
Max VA (@maxpl0it)
August
2023
This post details a fun little vulnerability found in TP-Link devices
MoreDissection of a Payment Terminal: Part 2
TECH
By
Rob H
July
2023
A further deep dive into the inner workings of an Ingenico payment terminal
MoreExploiting the HP Printer without the printer (Pwn2Own 2022)
TECH
By
Pwn2Own Team
June
2023
Interrupt Labs exploited the HP Color LaserJet Pro M479fdw printer successfully in Pwn2Own Toronto 2022. This blog post describes the technical details of the vulnerability, and how we developed the exploit before we received the physical device.
MoreLinux IPv6 "Route of Death" 0day
TECH
By
Max VA (@maxpl0it)
May
2023
This post explores an IPv6 vulnerability in the Linux Kernel that can remotely cause a system to kernel panic
MoreHeimdallr - A way to integrate IDA Pro into Obsidian Notes
RESOURCES
By
Robert S
February
2023
Heimdallr is an IDA Pro plugin that allows you to get to anywhere in a project from a single click on a ida:// link
Morepipe_buffer arbitrary read write
RESOURCES
By
Jayden R
November
2022
In this post we will look at an arbitrary read/write technique that can be used to achieve privilege escalation in a variety of Linux kernel builds.
MoreConverting IDA DB to VxWorks .sym
TIPS
By
Joseph B
July
2022
This article dives into the internals of IDA database files alongside the process of converting these files to VxWorks .sym files.
MoreGame Hacking with Binary Ninja
RESOURCES
By
Ben R
July
2022
Using the Binary Ninja API to script patches, demonstrated by cheating the PwnAdventure hackable game.
MoreDissection of a Payment Terminal
TECH
By
Rob H
May
2022
This series of Labs posts will document research into Ingenico payment terminals, including how the device’s physical tamper protection mechanisms work, the files and network protocols. and how to dump the firmware off the flash chip.
MoreHow to Speak your Hardware’s Language
TIPS
By
Joel C
February
2022
Note: This article was created to sit alongside training that was run at a recent conference. The article can be used in its own right, but you may need to acquire some components and tools to follow along.
MoreConverting IDA DB to VxWorks .sym
TIPS
By
Joseph B
July
2022
This article dives into the internals of IDA database files alongside the process of converting these files to VxWorks .sym files.
MoreHow to Speak your Hardware’s Language
TIPS
By
Joel C
February
2022
Note: This article was created to sit alongside training that was run at a recent conference. The article can be used in its own right, but you may need to acquire some components and tools to follow along.
MoreStardew Valley PRNG Seed Cracking
RESOURCES
By
Joseph B
July
2024
This blog post describes the process of reverse engineering the Nintendo Switch version of Stardew Valley to build two tools: Stardew Seed Cracker (a tool to crack the PRNG seed using stock from the Traveling Cart) and Stardew Predictor (a tool to predict future events based on the PRNG seed).
MoreJADX Collaboration
RESOURCES
By
Joseph B
June
2024
This post introduces JADX Collaboration, a plugin for JADX-GUI that allows users to seamlessly share their analysis with one another without ever leaving the program.
MoreIntegrating Semgrep Analysis with Binary Ninja
RESOURCES
By
Samman P
March
2024
This post outlines a Binary Ninja plugin that we've released to add native support for Semgrep analysis, which was developed during an internship.
MoreHeimdallr - A way to integrate IDA Pro into Obsidian Notes
RESOURCES
By
Robert S
February
2023
Heimdallr is an IDA Pro plugin that allows you to get to anywhere in a project from a single click on a ida:// link
Morepipe_buffer arbitrary read write
RESOURCES
By
Jayden R
November
2022
In this post we will look at an arbitrary read/write technique that can be used to achieve privilege escalation in a variety of Linux kernel builds.
MoreGame Hacking with Binary Ninja
RESOURCES
By
Ben R
July
2022
Using the Binary Ninja API to script patches, demonstrated by cheating the PwnAdventure hackable game.
MoreBeyond Android MTE: Navigating OEM's Logic Labyrinths
TECH
By
Max VA (@maxpl0it)
May
2024
We're back at Mobile Pwn2Own to show you how logic bugs can be chained to effortlessly pwn the latest Samsung and Xiaomi flagships.
MoreNewly Unreachable: The very sad story of a TP-Link bug
TECH
By
Max VA (@maxpl0it)
August
2023
This post details a fun little vulnerability found in TP-Link devices
MoreDissection of a Payment Terminal: Part 2
TECH
By
Rob H
July
2023
A further deep dive into the inner workings of an Ingenico payment terminal
MoreExploiting the HP Printer without the printer (Pwn2Own 2022)
TECH
By
Pwn2Own Team
June
2023
Interrupt Labs exploited the HP Color LaserJet Pro M479fdw printer successfully in Pwn2Own Toronto 2022. This blog post describes the technical details of the vulnerability, and how we developed the exploit before we received the physical device.
MoreLinux IPv6 "Route of Death" 0day
TECH
By
Max VA (@maxpl0it)
May
2023
This post explores an IPv6 vulnerability in the Linux Kernel that can remotely cause a system to kernel panic
MoreDissection of a Payment Terminal
TECH
By
Rob H
May
2022
This series of Labs posts will document research into Ingenico payment terminals, including how the device’s physical tamper protection mechanisms work, the files and network protocols. and how to dump the firmware off the flash chip.
Morepipe_buffer arbitrary read write
RESOURCES
By
Jayden R
November
2022
In this post we will look at an arbitrary read/write technique that can be used to achieve privilege escalation in a variety of Linux kernel builds.
MoreConverting IDA DB to VxWorks .sym
TIPS
By
Joseph B
July
2022
This article dives into the internals of IDA database files alongside the process of converting these files to VxWorks .sym files.
MoreGame Hacking with Binary Ninja
RESOURCES
By
Ben R
July
2022
Using the Binary Ninja API to script patches, demonstrated by cheating the PwnAdventure hackable game.
MoreDissection of a Payment Terminal
TECH
By
Rob H
May
2022
This series of Labs posts will document research into Ingenico payment terminals, including how the device’s physical tamper protection mechanisms work, the files and network protocols. and how to dump the firmware off the flash chip.
MoreHow to Speak your Hardware’s Language
TIPS
By
Joel C
February
2022
Note: This article was created to sit alongside training that was run at a recent conference. The article can be used in its own right, but you may need to acquire some components and tools to follow along.
MoreNewly Unreachable: The very sad story of a TP-Link bug
TECH
By
Max VA (@maxpl0it)
August
2023
This post details a fun little vulnerability found in TP-Link devices
MoreDissection of a Payment Terminal: Part 2
TECH
By
Rob H
July
2023
A further deep dive into the inner workings of an Ingenico payment terminal
MoreExploiting the HP Printer without the printer (Pwn2Own 2022)
TECH
By
Pwn2Own Team
June
2023
Interrupt Labs exploited the HP Color LaserJet Pro M479fdw printer successfully in Pwn2Own Toronto 2022. This blog post describes the technical details of the vulnerability, and how we developed the exploit before we received the physical device.
MoreLinux IPv6 "Route of Death" 0day
TECH
By
Max VA (@maxpl0it)
May
2023
This post explores an IPv6 vulnerability in the Linux Kernel that can remotely cause a system to kernel panic
MoreHeimdallr - A way to integrate IDA Pro into Obsidian Notes
RESOURCES
By
Robert S
February
2023
Heimdallr is an IDA Pro plugin that allows you to get to anywhere in a project from a single click on a ida:// link
MoreStardew Valley PRNG Seed Cracking
RESOURCES
By
Joseph B
July
2024
This blog post describes the process of reverse engineering the Nintendo Switch version of Stardew Valley to build two tools: Stardew Seed Cracker (a tool to crack the PRNG seed using stock from the Traveling Cart) and Stardew Predictor (a tool to predict future events based on the PRNG seed).
MoreJADX Collaboration
RESOURCES
By
Joseph B
June
2024
This post introduces JADX Collaboration, a plugin for JADX-GUI that allows users to seamlessly share their analysis with one another without ever leaving the program.
MoreBeyond Android MTE: Navigating OEM's Logic Labyrinths
TECH
By
Max VA (@maxpl0it)
May
2024
We're back at Mobile Pwn2Own to show you how logic bugs can be chained to effortlessly pwn the latest Samsung and Xiaomi flagships.
MoreIntegrating Semgrep Analysis with Binary Ninja
RESOURCES
By
Samman P
March
2024
This post outlines a Binary Ninja plugin that we've released to add native support for Semgrep analysis, which was developed during an internship.
More