LimitedResults

@LimitedResults

Limited contribution to this world.

In the lab
Vrijeme pridruživanja: listopad 2018.

Medijski sadržaj

  1. 12. sij

    First Post of the year! Glitch the Nuvoton M2351 MKROM and its crypto. This MCU is based on Cortex-M23 (TrustZone-M) and dedicated to IoT security: 💅💅💅

  2. 6. pro 2019.
  3. 13. stu 2019.

    Last and FATAL HW exploit on ESP32. Using this, an attacker is now able to decrypt the firmware and install its own (encrypted) malware PERSISTENTLY. No Fix on current ESP32 , vuln is here forever 😮 Enjoy:

  4. 1. stu 2019.
  5. 30. ruj 2019.

    I Offer 2 Student Passes for 2019. Conditions for student: So, DM with your first/last name, email, and nice words maybe... I will forward to and they will contact you to confirm your qualification. Results announced Friday 4th Oct.

  6. 1. ruj 2019.

    The Disclosure about Esp32 security continues. This time, it's a secure boot bypass using voltage glitching: No way to fix it except hardware revision🥶. Stay tuned for the final act.

  7. 19. kol 2019.

    Flash Encryption Key and Sec Boot Key extracted from 'fully secure' Esp32. Allows Persistent FW modification on the target, firmware & data readout... No way to patch except hardware redesign 🤕. More info and write-up soon...

  8. 10. kol 2019.

    My disclosure about ESP32 security starts today by pwning the Crypto-Core: More serious exploits on ESP32 soon…stay tuned ;-)

  9. 2. srp 2019.

    10$ EMFI on STM32. For-loop iteration skipped in custom test app... ⚡️⚡️ == 😁

  10. 21. lip 2019.
    Odgovor korisniku/ci

    Dont hesitate man 😉

  11. 6. lip 2019.

    I notify a silent patch into ESP-IDF three days ago (v4 vs v3.3) after reporting the crypto vulns I found. No reward, no credits?!? WTF, You loose a friend today... full disclosure is coming

  12. 4. lip 2019.

    Live PoC! Just a bypass Esp32 Secure boot.... Stay tuned, More hack to come 😁

  13. 25. svi 2019.

    I don't like being recorded but I like sharing my slides! Find them here: Thanks for this nice day guys! 😁🍻

  14. 12. svi 2019.
  15. 7. svi 2019.

    DFA successful on MbedTLS AES (PoC on esp32) 😁 And nice analysis tools Jeangrey & Stark from thx man!

  16. 20. tra 2019.

    Little fault inj. setup and your AES hw accelarator returns the plaintext as output ... 😋

  17. 28. ožu 2019.
    Odgovor korisnicima

    Sandpaper experiments on fcbga, soooo low cost 😁

  18. 17. ožu 2019.

    On my way home! Thanks to for the great conference and the amazing party 😁👍

  19. 16. ožu 2019.

    I share the slides here: More hack to come... Nice conference, nice place...look at this logo 👍👍! Thanks!

  20. 15. ožu 2019.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·