Mickey

@HackingThings

Hacker, bricker of things, cluster head. quality shitposts. opinions are my own.

United States
Vrijeme pridruživanja: travanj 2013.

Tweetovi

Blokirali ste korisnika/cu @HackingThings

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HackingThings

  1. Prikvačeni tweet
    30. lis 2016.

    Using inception over the air , thank you Wireless Bus Extensions.

    Poništi
  2. prije 17 sati

    Me during the Super Bowl

    Poništi
  3. 1. velj

    That’s the most red team thing I’ve ever heard 😂

    Poništi
  4. 31. sij

    What is this? 1. Tip cleaning sponge. 2. A tasty cracker.

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Come work with an awesome research team on firmware and hardware threats!

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    My Reverse Engineering C++ Binaries Training will be part of in 😁

    Poništi
  7. proslijedio/la je Tweet
    30. sij
    Odgovor korisniku/ci

    Another (old) example of remote DMA attack using a vulnerable NIC:

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    We at have just released a great research paper on vulnerabilities in Azure Cloud, practically breaking the isolation of Azure Functions (MS Lambda equivalent). Kudos to for an amazing work!

    Poništi
  9. proslijedio/la je Tweet
    30. sij

    What happened when & looked at HP & Dell laptops for DMA vulnerabilities? They found some. Join them for a Q&A on Feb. 5 to hear more and ask questions. Register here: . ,

    Poništi
  10. proslijedio/la je Tweet

    "The actual adoption and correct uses of these features in the hardware …lags significantly behind when the feature is introduced in the marketplace,” .

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    New --> Why direct-memory attacks on laptops just won't go away

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    30. sij

    I brought one hundred NFC Type 5 microcontroller boards to Shmoocon, which are OTA programmable from Android. You can have one for free if you install the compiler toolchain documented on the Github page.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    30. sij

    Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, and show that high speed DMA attacks can bypass hardware protections on enterprise devices.

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find. Early 🐦 prices are still available at ! Register now ➡️ RTs appreciated!

    Poništi
  15. proslijedio/la je Tweet
    29. sij

    Want to learn about reverse engineering and breaking hardware, but don't know where to start? My 2-day Hardware Hacking Basics class returns for both the weekend and weekday sessions! and

    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Our research team is growing. If you're interested in developing detection methods for PC firmware threats and vulnerabilities, send your resume/CV to careers@eclypsium.com. Portland, USA or Córdoba, Argentina preferred. DMs open for questions.

    Poništi
  17. proslijedio/la je Tweet
    30. sij

    Going to but don't have a ticket? You're in luck as the Oracle Cloud Infrastructure Red Team fought the F5 war and has emerged with an extra ticket! Find Thursday night at lobbycon and tell him about this tweet to receive your barcode and admission into the con!

    Poništi
  18. proslijedio/la je Tweet
    29. sij

    CanSecWest is offering a free training and conference admission to the top 4 talk submissions from someone 25 or younger! All qualifying submissions also get a 10% discount on conference ticket. That’s basically a $5000 USD grant to the top 4 submissions. Please share!

    Poništi
  19. proslijedio/la je Tweet
    29. sij

    We will reserve a talk slot for most promising new speaker, age 25 and under, picked by our selection committee, fly them out to talk. For the top four submitters, including the winner, we'll give complentary seats at a Dojo of their choice (lim 1/course, rank choice) 2/4

    Poništi
  20. proslijedio/la je Tweet
    29. sij

    All Ringzer0 trainings are hands-on 🙌 The way infosec training should be! After attending, you’ll have something to “show” for it…and we’re not talking about a big, fancy binder! Apply what you learn immediately. Get your Early Bird ticket now 👏

    Poništi
  21. proslijedio/la je Tweet
    29. sij

    Bob Rossing a fucktup Apple

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·