Oran

@Oranav

Security researcher, Linux enthusiast. Plays for . Independent.

Vrijeme pridruživanja: prosinac 2008.

Tweetovi

Blokirali ste korisnika/cu @Oranav

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Oranav

  1. 11. sij

    You asked for it :-)

    Prikaži ovu nit
    Poništi
  2. 11. sij

    I published a write-up for md15 from 36C3 CTF:

    Prikaži ovu nit
    Poništi
  3. 29. pro 2019.

    CTF was so good! I stared at md15 for maybe 10 hours straight. Thanks guys :-)

    Poništi
  4. proslijedio/la je Tweet

    CTF players, bug hunters and students descended onto London to play, hack and learn. Congrats to for winning - again! :)

    Prikaži ovu nit
    Poništi
  5. 27. lip 2019.

    This is exactly how we solved the challenge. It's crazy that two teams independently solved the challenge with a CPU bug. I wanted to write a write-up earlier but I've been lazy :( Nevertheless this posts pretty much sums it up. Worth reading!

    Poništi
  6. proslijedio/la je Tweet

    The Google CTF is over. Congratulations to pasten for the first place! (deja-vu?)

    Poništi
  7. proslijedio/la je Tweet

    A direct rocket hit on a car in the city of Ashdod. An Israeli man was seriously injured and is in critical condition. Ashdod is the 6th largest city in Israel.

    Poništi
  8. 5. svi 2019.

    This is from Ashdod, my hometown. Media tends to show a one-sided picture. We had to run to the bomb shelters 6 times in the past 10 minutes. Ashdod is the 6th largest city in Israel. Imagine this situation in Philadelphia, 6th largest city in the USA.

    Poništi
  9. proslijedio/la je Tweet

    Don’t stop believing! We came close but unfortunately didn’t succeed with the landing process. More updates to follow.

    Poništi
  10. proslijedio/la je Tweet
    21. velj 2019.

    Successful deployment of the SpaceIL lunar lander confirmed, starting the spacecraft’s two-month voyage to the Moon

    Poništi
  11. 5. sij 2019.

    Apparently someone has put up an interactive guide to i9300 un-bricking using my tools. I know that I suck at documenting and/or helping users, so this is great news!

    Poništi
  12. proslijedio/la je Tweet
    31. kol 2018.
    Poništi
  13. proslijedio/la je Tweet
    29. srp 2018.

    A trio of new blog posts! Checkout "PS4 Aux Hax": hacking Aeolia, Syscon, and DS4.

    Poništi
  14. 25. lip 2018.

    qualifiers was fun! It definitely improves over the years. I particularly enjoyed sandbox-compat, despite me wanting to shoot myself after reading x86 documentation again and again, and despite the fact we solved it 15 mins after the deadline

    Poništi
  15. proslijedio/la je Tweet
    23. tra 2018.
    Poništi
  16. 11. tra 2018.

    I modified my GT-I9300 shellcode to (theoretically) support every sboot version. Now you can revive your bricked Galaxy S3 eMMC no matter which sboot you have. First report of success!

    Poništi
  17. proslijedio/la je Tweet
    9. ožu 2018.

    Meltdown & Spectre PoC for OpenBSD

    Poništi
  18. 10. velj 2018.

    I do love , but definitely willing to give it a shot. 🙂

    Poništi
  19. 9. velj 2018.

    I also spent an hour comparing our code to the original. So much fun! against iBoot/drivers/flash_nand/raw/Whimory/Core/FTL/ (sorry, no link here, but you can find it...)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·