tdec

@0xtdec

Invalidating assumptions for a living. Hardware Hacking for guacamole.

Earth
Vrijeme pridruživanja: kolovoz 2013.

Tweetovi

Blokirali ste korisnika/cu @0xtdec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xtdec

  1. 19. pro 2019.

    Guess who was finishing enclosures and filling boxes yesterday? I hope everyone will enjoy their freshly minted USB Armory's !

    Poništi
  2. 16. pro 2019.

    My awesome colleague did a thing ! Lots of interesting low-level findings against a real product. Nicely demonstrates the team capabilities :)

    Poništi
  3. 8. pro 2019.

    ... Yes, I am a criminal. My crime is that of curiosity. ... (1986)

    Poništi
  4. 20. stu 2019.

    Dumping an eMMC flash by dd'ing the block device into gzip from a hypervisor instance over a locally port forwarded SSH connection, over USB ethernet. Triggered from a test VM with the file being stored on the mounted host filesystem. It's crazy this stuff works.

    Poništi
  5. 17. stu 2019.

    Does anyone have the key ? 😃

    Poništi
  6. proslijedio/la je Tweet
    11. stu 2019.

    Anyone have a tool to work with Cisco's MZIP files? AKA Catalyst firmware images

    Poništi
  7. 31. lis 2019.

    36 more hours to go if you want to be among the first ones to receive your new USB armory MkII !

    Poništi
  8. 28. lis 2019.

    Well, wrestling for a few hours with a botnet DoSing one of my servers was _not_ what I had in mind for this evening :/

    Poništi
  9. 24. lis 2019.

    Look at the awesomesauce my colleagues made !

    Poništi
  10. 30. ruj 2019.

    Microsoft releases Windows Virtual Desktop to scale Windows Desktop on Azure. Are we seeing the first stages of no more standalone desktop operating system, but just a thin wrapper around virtualized services in a cloud infrastructure ?

    Poništi
  11. 27. ruj 2019.

    As the checkm8 exploit seems to have been reversed from a patch, I'm curious who found it in the first place and how it got reported ? Or was this exploited in the wild before ?

    Poništi
  12. 25. ruj 2019.

    This is super exciting, go get your new Armory Mk II now !!

    Poništi
  13. 24. ruj 2019.

    Glad to be part of this team and the amazing work that happens. We have a new home for all to see some of the things we're up to !

    Poništi
  14. proslijedio/la je Tweet

    Introducing armoryctl, a Go tool/library to query and control USB armory Mk II peripherals (even on other boards which include them).

    Poništi
  15. 10. ruj 2019.

    Quote: the system under investigation “was deemed secure as it was sent to specific pager devices and didn’t seem to rely on any radio connection”. Magic pagers up in Canada ! 🧐

    Poništi
  16. 3. ruj 2019.

    As a parting thought for the day, so far all is working well, including SSH over CDC Ethernet

    Poništi
  17. 2. ruj 2019.

    Sneak peek of the USB Armory Mk II beta unit and the debug accessory I received last week from . Looking forward to start experimenting and contributing tools.

    Poništi
  18. 23. kol 2019.

    I just published a small IDA helper script to facilitate finding the lowest common ancestor functions for two defined function calls. Can be helpful to identify interesting functions for deep hooking while fuzzing.

    Poništi
  19. 22. kol 2019.

    I got called a snoring banana this morning by a 4-year old. Uncertain whether to be offended or somewhat admiring of the creativity.

    Poništi
  20. 18. kol 2019.

    4 challenges done in , good fun, unfortunately there won't be too much time to continue it in the next week

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·