Labs

Research fromthe team atInterrupt Labs

Interrupt labs mascot

The team at Interrupt Labs are a clever bunch – here they share their top tips, resources and research around computer security.

Newly Unreachable: The very sad story of a TP-Link bug

Newly Unreachable: The very sad story of a TP-Link bug

TECH

By

Max VA (@maxpl0it)

This post details a fun little vulnerability found in TP-Link devices

More
Dissection of a Payment Terminal: Part 2

Dissection of a Payment Terminal: Part 2

TECH

By

Rob H

A further deep dive into the inner workings of an Ingenico payment terminal

More
Exploiting the HP Printer without the printer (Pwn2Own 2022)

Exploiting the HP Printer without the printer (Pwn2Own 2022)

TECH

By

Pwn2Own Team

Interrupt Labs exploited the HP Color LaserJet Pro M479fdw printer successfully in Pwn2Own Toronto 2022. This blog post describes the technical details of the vulnerability, and how we developed the exploit before we received the physical device.

More
Linux IPv6 "Route of Death" 0day

Linux IPv6 "Route of Death" 0day

TECH

By

Max VA (@maxpl0it)

This post explores an IPv6 vulnerability in the Linux Kernel that can remotely cause a system to kernel panic

More
Heimdallr - A way to integrate IDA Pro into Obsidian Notes

Heimdallr - A way to integrate IDA Pro into Obsidian Notes

RESOURCES

By

Robert S

Heimdallr is an IDA Pro plugin that allows you to get to anywhere in a project from a single click on a ida:// link

More
pipe_buffer arbitrary read write

pipe_buffer arbitrary read write

RESOURCES

By

Jayden R

In this post we will look at an arbitrary read/write technique that can be used to achieve privilege escalation in a variety of Linux kernel builds.

More
Converting IDA DB to VxWorks .sym

Converting IDA DB to VxWorks .sym

TIPS

By

Joseph B

This article dives into the internals of IDA database files alongside the process of converting these files to VxWorks .sym files.

More
Game Hacking with Binary Ninja

Game Hacking with Binary Ninja

RESOURCES

By

Ben R

Using the Binary Ninja API to script patches, demonstrated by cheating the PwnAdventure hackable game.

More
Dissection of a Payment Terminal

Dissection of a Payment Terminal

TECH

By

Rob H

This series of Labs posts will document research into Ingenico payment terminals, including how the device’s physical tamper protection mechanisms work, the files and network protocols. and how to dump the firmware off the flash chip.

More
How to Speak your Hardware’s Language

How to Speak your Hardware’s Language

TIPS

By

Joel C

Note: This article was created to sit alongside training that was run at a recent conference. The article can be used in its own right, but you may need to acquire some components and tools to follow along.

More
Converting IDA DB to VxWorks .sym

Converting IDA DB to VxWorks .sym

TIPS

By

Joseph B

This article dives into the internals of IDA database files alongside the process of converting these files to VxWorks .sym files.

More
How to Speak your Hardware’s Language

How to Speak your Hardware’s Language

TIPS

By

Joel C

Note: This article was created to sit alongside training that was run at a recent conference. The article can be used in its own right, but you may need to acquire some components and tools to follow along.

More
Heimdallr - A way to integrate IDA Pro into Obsidian Notes

Heimdallr - A way to integrate IDA Pro into Obsidian Notes

RESOURCES

By

Robert S

Heimdallr is an IDA Pro plugin that allows you to get to anywhere in a project from a single click on a ida:// link

More
pipe_buffer arbitrary read write

pipe_buffer arbitrary read write

RESOURCES

By

Jayden R

In this post we will look at an arbitrary read/write technique that can be used to achieve privilege escalation in a variety of Linux kernel builds.

More
Game Hacking with Binary Ninja

Game Hacking with Binary Ninja

RESOURCES

By

Ben R

Using the Binary Ninja API to script patches, demonstrated by cheating the PwnAdventure hackable game.

More
Newly Unreachable: The very sad story of a TP-Link bug

Newly Unreachable: The very sad story of a TP-Link bug

TECH

By

Max VA (@maxpl0it)

This post details a fun little vulnerability found in TP-Link devices

More
Dissection of a Payment Terminal: Part 2

Dissection of a Payment Terminal: Part 2

TECH

By

Rob H

A further deep dive into the inner workings of an Ingenico payment terminal

More
Exploiting the HP Printer without the printer (Pwn2Own 2022)

Exploiting the HP Printer without the printer (Pwn2Own 2022)

TECH

By

Pwn2Own Team

Interrupt Labs exploited the HP Color LaserJet Pro M479fdw printer successfully in Pwn2Own Toronto 2022. This blog post describes the technical details of the vulnerability, and how we developed the exploit before we received the physical device.

More
Linux IPv6 "Route of Death" 0day

Linux IPv6 "Route of Death" 0day

TECH

By

Max VA (@maxpl0it)

This post explores an IPv6 vulnerability in the Linux Kernel that can remotely cause a system to kernel panic

More
Dissection of a Payment Terminal

Dissection of a Payment Terminal

TECH

By

Rob H

This series of Labs posts will document research into Ingenico payment terminals, including how the device’s physical tamper protection mechanisms work, the files and network protocols. and how to dump the firmware off the flash chip.

More
pipe_buffer arbitrary read write

pipe_buffer arbitrary read write

RESOURCES

By

Jayden R

In this post we will look at an arbitrary read/write technique that can be used to achieve privilege escalation in a variety of Linux kernel builds.

More
Converting IDA DB to VxWorks .sym

Converting IDA DB to VxWorks .sym

TIPS

By

Joseph B

This article dives into the internals of IDA database files alongside the process of converting these files to VxWorks .sym files.

More
Game Hacking with Binary Ninja

Game Hacking with Binary Ninja

RESOURCES

By

Ben R

Using the Binary Ninja API to script patches, demonstrated by cheating the PwnAdventure hackable game.

More
Dissection of a Payment Terminal

Dissection of a Payment Terminal

TECH

By

Rob H

This series of Labs posts will document research into Ingenico payment terminals, including how the device’s physical tamper protection mechanisms work, the files and network protocols. and how to dump the firmware off the flash chip.

More
How to Speak your Hardware’s Language

How to Speak your Hardware’s Language

TIPS

By

Joel C

Note: This article was created to sit alongside training that was run at a recent conference. The article can be used in its own right, but you may need to acquire some components and tools to follow along.

More
Newly Unreachable: The very sad story of a TP-Link bug

Newly Unreachable: The very sad story of a TP-Link bug

TECH

By

Max VA (@maxpl0it)

This post details a fun little vulnerability found in TP-Link devices

More
Dissection of a Payment Terminal: Part 2

Dissection of a Payment Terminal: Part 2

TECH

By

Rob H

A further deep dive into the inner workings of an Ingenico payment terminal

More
Exploiting the HP Printer without the printer (Pwn2Own 2022)

Exploiting the HP Printer without the printer (Pwn2Own 2022)

TECH

By

Pwn2Own Team

Interrupt Labs exploited the HP Color LaserJet Pro M479fdw printer successfully in Pwn2Own Toronto 2022. This blog post describes the technical details of the vulnerability, and how we developed the exploit before we received the physical device.

More
Linux IPv6 "Route of Death" 0day

Linux IPv6 "Route of Death" 0day

TECH

By

Max VA (@maxpl0it)

This post explores an IPv6 vulnerability in the Linux Kernel that can remotely cause a system to kernel panic

More
Heimdallr - A way to integrate IDA Pro into Obsidian Notes

Heimdallr - A way to integrate IDA Pro into Obsidian Notes

RESOURCES

By

Robert S

Heimdallr is an IDA Pro plugin that allows you to get to anywhere in a project from a single click on a ida:// link

More
Back to top icon
Please click on "Preferences" to confirm your cookie preferences. By default, the essential cookies are always activated. View our Cookie Policy for more information.