Margin Research (Page 2)

Margin Research Blog

Writings on Security, Research, and Technology

smoothie_operator<<
Nov 23, 2022

smoothie_operator<<

Description This blog details a C++ heap exploitation challenge written for CSAW CTF Finals 2022. This challenge incorporates an OOB heap write primitive to corrupt heap metadata, creating a use-after-free (UAF) by clobbering the C++ std::shared_ptr struct. The challenge is a x86-64 ELF binary linked against glibc v2.

Ian Dupont
By Ian Dupont
Russia’s Open-Source Code and Private-Sector Cybersecurity Ecosystem
Nov 10, 2022

Russia’s Open-Source Code and Private-Sector Cybersecurity Ecosystem

Through our work on SocialCyber, we map sanctioned Russian cyber actors, their contributions to the linux kernel, and the private-sector firms supporting Russian cyber operations.

Justin Sherman
By Justin Sherman
An opinionated guide on how to reverse engineer software, part 2
Nov 8, 2022

An opinionated guide on how to reverse engineer software, part 2

The best reverse engineer is also a very capable software developer. Why you may ask? Because almost no one reinvents the wheel.

Ryan Stortz
By Ryan Stortz
Winternships and a new look
Nov 7, 2022

Winternships and a new look

The website has gotten a facelift! If you've been to our site before you might notice some changes. The most significant change is in our blog backend, making sharing our great research and new tool releases easier with the internet. Another big shift is consolidating all of our

Sophia d'Antoine
By Sophia d'Antoine
Pulling MikroTik into the Limelight
Jun 11, 2022

Pulling MikroTik into the Limelight

A comprehensive guide to MikroTik internals, including IPC, hand-rolled cryptography, and a novel post-authentication jailbreak

Ian Dupont
By Ian Dupont
Harrison Green
By Harrison Green
Cannoli: The Fast Qemu Tracer
May 26, 2022

Cannoli: The Fast Qemu Tracer

Cannoli Cannoli is a high-performance tracing engine for qemu-user. It can record a trace of both PCs executed as well as memory operations. It consists of a small patch to QEMU to expose locations to inject some code directly into the JIT, a shared library which is loaded into QEMU

Brandon Falk
By Brandon Falk
The Chinese Private Sector Cyber Landscape
Apr 25, 2022

The Chinese Private Sector Cyber Landscape

As China's "decade-long quest to become a superpower" comes to fruition, the PRC has increasingly moved to eliminate barriers between its civilian-commercial industries and the State.

Margin Research
By Margin Research
Watching the Watchers
Apr 5, 2022

Watching the Watchers

Much of our world relies on open source projects. The Linux kernel is arguably the crowning achievement of the open source movement, the foundation of Google’s Android and NASA’s satellite software. But five of the top ten bug reporters are automated systems.

Winnona Bernsen
By Winnona Bernsen
Ian Roos
By Ian Roos
MikroTik Authentication Revealed
Feb 10, 2022

MikroTik Authentication Revealed

A deep-dive into MikroTik's hand-rolled Elliptic Curve Secure Remote Protocol (EC-SRP) cryptography used in client-server authentication

Ian Dupont
By Ian Dupont
Joe Lothan
By Joe Lothan
Page 2 of 3
arrow-up icon