Thomas Roth

@StackSmashing

When you say JMP I ask to which address. Forbes 30 under 30 2018. Founder of , co-founder of .

::1
Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @StackSmashing

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @StackSmashing

  1. Prikvačeni tweet
    14. sij

    My talk on breaking TrustZone-M on a variety of ARMv8-M processors can now be watched here:

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Amazing video on reverse engineering. Especially the recaps on what was found so far and how the control flow of the program works, helps to keep track of everything.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  4. 31. sij

    Having grown up in a Europe without borders I can’t believe Brexit actually happened. Here’s to a reunion, hopefully sooner rather than later.

    Poništi
  5. proslijedio/la je Tweet
    25. sij
    Odgovor korisnicima

    My favorite typo is DESfire EV1 cards using 0x80 instead of 0x08 as prefix byte for random UID. I just have to guess that nobody noticed until after they had sealed it in silicon and then just went "fuck it, we'll just update the datasheet".

    Poništi
  6. 25. sij

    The number of typos in smartcard/NFC datasheets is nuts - I wonder how many engineering hours are wasted because some wrong '00' slipped into the APDU documentation :) And then you read on the vendor forum: "Known issue, just use X/Y/Z" - instead of fixing the datasheets/ANs...

    Poništi
  7. 24. sij

    Meanwhile there are also a couple of seats left for my introductory IoT hacking class at in February, and you can get 10% off by using the code TWITTER,

    Prikaži ovu nit
    Poništi
  8. 24. sij

    Super excited: My "Advanced real-world IoT & embedded hacking" class was accepted for USA!

    Prikaži ovu nit
    Poništi
  9. 21. sij

    When you need internet to unlock your padlock 👌 /cc

    Poništi
  10. 20. sij

    I'm giving out a ticket for the (sold-out) to a member of an under-represented group. If you are interested feel free to send me a DM!

    Poništi
  11. proslijedio/la je Tweet
    18. sij

    Great explanation of CVE-2020-0601 (aka Curveball aka Whose Curve is it Anyway aka the NSA Microsoft CryptoAPI Vulnerability). It's really accessible and accidentally made me understand ECC properly for the first time

    Poništi
  12. 17. sij

    I tried to explain the technical details of CVE-2020-0601 in a video:

    Poništi
  13. 14. sij

    I suggest x.50nein as the vuln name!

    Poništi
  14. 14. sij

    This is awesome, makes decentralized detection of attacks much easier.

    Poništi
  15. 14. sij

    Also, there are still some seats left for my hands-on IoT hacking training in February in Berlin! You can use code TWITTER for 10% off!

    Poništi
  16. 13. sij

    I put the results of my weekend project into a video: Reversing and backdooring an IoT surveillance camera firmware!

    Poništi
  17. proslijedio/la je Tweet
    13. sij

    Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!

    Prikaži ovu nit
    Poništi
  18. 11. sij

    You vs the busybox she told you not to worry about.

    Poništi
  19. 11. sij

    Reversed two CRC32 checks only to find out that it's just a standard u-boot format I failed to recognize.

    Prikaži ovu nit
    Poništi
  20. 11. sij

    "So, what are you doing on the weekend?" - "Reverse engineering the firmware upgrade checks of my surveillance camera"

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·