Category: Vulnerability Analysis

Tails from the Cri2p

In continuation of the previous blog Fairy Tails and Silver Bullets we present the technical details of the flaws found in I2P (Invisible Internet Project)

Read More

Silver Bullets and Fairy Tails

Introduction This week we made mention on Twitter of a zero-day vulnerability we’ve unearthed that affects the popular Tails operating system. As the Tails website

Read More

DoS? Then Who Was Phone?

Introduction This post presents exploitation notes on a vulnerability we discovered in Asterisk, an open source telephony solution produced by Digium. We reported this bug

Read More