Custom fabrication. Reversing D-Link router firmware

Date: 02/04/2025

When you create custom firmware for routers, you often have to forge the signature so that your handmade microcode can be flushed using the stock web interface. To forge a signature, you must be familiar with the image validation procedure in the stock firmware. To get a general idea of this process, let’s reverse firmware embedded into the D-Link DIR-806A B1 router and find out how signature validation is implemented in it.
Read full article →

Serpent anatomy: Dissecting and reversing PyInstaller

Date: 25/03/2025

Humanity has created a whole bestiary of scripting languages ​​with low learning curves in an attempt to make the IT world accessible to imbeciles newbies who have completed a month-long course. Without question, Python is currently the king of beasts in this bestiary. The creeping reptile has entangled the entire IT industry with its rings so much that even a neural network cannot be trained without it. If so, time has come to dissect the serpent and look at its insides. Let’s start with a technology called PyInstaller.
Read full article →

ADS-B Spoofing

Date: 17/03/2025

Modern aircraft continuously transmit telemetry to each other using the ADS-B protocol. In this article, I will explain how to create your own imaginary plane and demonstrate how data transmission works. Important: all actions described below will be performed in strict compliance with the respective laws and safety regulations.
Read full article →

ADS-B guide

Date: 24/02/2025

Wherever you are, aircraft frequently pass overhead; sometimes several ones in a few minutes. Services like Flightradar24 provide precise real-time information about these flights using data received over the ADS-B protocol. You can also receive and decode such data; just follow instructions provided in this guide!
Read full article →

Safe Python: Secure coding techniques

Date: 10/02/2025

This article discusses an important matter every cool hacker programmer should care about: secure code. Perhaps, you think it’s boring and difficult? Not at all! Today I will share with you some of my experience and show how to write Python code you can be proud of.
Read full article →

Challenge the Keemaker! How to bypass antiviruses and inject shellcode into KeePass memory

Date: 03/06/2022

Recently, I was involved with a challenging pentesting project. Using the KeeThief utility from GhostPack, I tried to extract the master password for the open-source KeePass database from the process memory. Too bad, EDR was monitoring the system and prevented me from doing this: after all, KeeThief injects shellcode into a remote process in a classical oldie-goodie way, and in 2022, such actions have no chance to go unnoticed.
Read full article →