Andrés Blanco

@6e726d

I enjoy playing with hardware and network protocols especially with IEEE 802.11.

Buenos Aires
Vrijeme pridruživanja: travanj 2010.

Tweetovi

Blokirali ste korisnika/cu @6e726d

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @6e726d

  1. proslijedio/la je Tweet
    31. sij

    Personally, I hate the term noob. I've been doing IT for 25 years and still learn new things everyday. We're all noobs in some area or another. I prefer to think of someone new to the industry as a beginner, just starting their lifelong process of education.

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    Alguien con experiencia en pentest que quiera pasarse al lado defensivo y aprender crypto? DM 🧉

    Poništi
  3. proslijedio/la je Tweet
    25. sij
    Poništi
  4. proslijedio/la je Tweet
    24. sij

    We are pleased to announce our first two INFILTRATE 2020 speakers: Marco Ivaldi () presenting: The INFILTRATE Effect: 6 Bugs in 6 Months & William Woodruff () presenting: Destroying x86_64 Decoders with Differential Fuzzing.  

    Poništi
  5. 22. sij

    Because Hardware and Photography can be enjoy together.

    Poništi
  6. proslijedio/la je Tweet
    21. sij

    Apply for a position as a Senior Security Consultant with Immunity at our HQ in Miami, Florida or Arlington, Virginia.

    Poništi
  7. proslijedio/la je Tweet
    20. sij

    You are submitting a presentation to a conference for a 45 minutes slot, the talk preparation will take days (if not weeks), and you decide to spent less than five minutes on your abstract. Please, increase your acceptance rate. Invest some time on your CFP submission!

    Poništi
  8. 20. sij

    Be careful with small components that could be ripped apart from the PCB when removing the glue. This is really important.

    Prikaži ovu nit
    Poništi
  9. 20. sij

    When doing some Hardware Hacking sometimes you can’t or prefer to avoid soldering stuff to the PCB. Using Hot Glue Gun and the proper angle could do the trick.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    16. sij

    CVE-2019-9500 The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to t...

    Poništi
  11. proslijedio/la je Tweet
    11. sij

    FREE BINARY NINJA LICENSES !!?! Well, free for two people anyway! And not just any licenses, but commercial licenses! Our annual customer survey now includes more general RE questions and includes many prizes:

    Poništi
  12. proslijedio/la je Tweet
    8. sij

    Don't miss out on the lowest tier price! Register for the conference now before ticket prices increase - only 14 tickets left in the 'Pre-Auth' Ticket price tier:

    Poništi
  13. proslijedio/la je Tweet
    10. sij

    Want to see how fast you can get a new architecture added to Binary Ninja? Andrew's blog post () is a great introduction to adding support for a new architecture by leveraging an existing disassembler.

    Poništi
  14. proslijedio/la je Tweet
    7. sij

    The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of !!  

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    6. sij

    THING YOU NEED TO DO TODAY: Submit to the CFP.

    Poništi
  16. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  17. proslijedio/la je Tweet
    Poništi
  18. proslijedio/la je Tweet
    30. pro 2019.

    Response from Correllium CEO Amanda Gorton to latest Apple filing in ongoing lawsuit. Believes should concern jailbreakers more generally

    Poništi
  19. proslijedio/la je Tweet
    28. pro 2019.

    Today I found a new, open source tool from Microsoft: etl2pcapng. "Utility that converts an .etl file containing a Windows network packet capture into .pcapng format." Forked it and added code to add a comment to each packet containing the process id (PID)

    Poništi
  20. 25. pro 2019.

    Want to learn how to create a Hardware Implant come to our talk “A Practical Recipe for Hardware Implants” at

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·