Ulf Frisk

@UlfFrisk

IT-Security Minion | DMA Hacker | | PCILeech | MemProcFS

Sweden
Vrijeme pridruživanja: travanj 2016.

Tweetovi

Blokirali ste korisnika/cu @UlfFrisk

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @UlfFrisk

  1. Prikvačeni tweet
    29. ožu 2018.

    OOB patches available now! No longer ZERO-DAY! APPLY PATCHES NOW! (Win7/2008R2) CVE-2018-1038 . Awesome turnaround time and support from ! Super impressive work given the time frame!

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, and show that high speed DMA attacks can bypass hardware protections on enterprise devices.

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  5. 26. sij

    Anyone know if there are plans for nested Hyper-V on AMD/EPYC/Ryzen?

    Poništi
  6. proslijedio/la je Tweet
    23. sij

    I was hoping to give the first peek at some new research on attacking high speed interfaces at , and they were kind enough to accept! See you in Barcelona...

    Poništi
  7. 21. sij

    Got myself a new AMD 😀 can't wait to try it out! Hopefully cooler will arrive tomorrow...

    Poništi
  8. proslijedio/la je Tweet

    - I’ve been waiting to announce this all month; I’ll be crossing another conference off my speaking bucket list in ~2wks when I go onstage at ! I’ve been waiting for this for 2+ years - I might be a little excited about it 🤩

    Poništi
  9. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    COMMENTARY ON CVE-2020-0601: I have been speaking to several players on this on background and there are a few things they want to highlight / clarify based on the public discourse so far.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    - here it is folks. The first sentence is key; this is not remote, not code execution, not "MS17-010 bad". Should you patch? Absolutely. Is it the end of computers as we know it? Lol, no, not even close.

    Poništi
  12. 7. sij

    It's also possible to configure FPGA PCIe core to receive most config packets on software interface - mbe it's even possible to emulate a device in software (not implemented tho).

    Prikaži ovu nit
    Poništi
  13. 7. sij

    Rebuild and flash FPGA to activate custom configspace (recommended), or activate on pre-built bitstream by calling LeechCore library API (less recommended).

    Prikaži ovu nit
    Poništi
  14. 7. sij

    PCILeech FPGA custom PCIe configspace now supported! Mimic real devices more closely for research purposes 😈 Also, code signing of binaries.

    Prikaži ovu nit
    Poništi
  15. 4. sij

    sadly this also mean that I'm unable to test my UEFI/OS VT-d handover glitch fpga-code I already had prepared (need to find a better laptop first).

    Prikaži ovu nit
    Poništi
  16. 4. sij

    same UEFI DMA attack I demoed at 34c3 still work 2 years later on my brand new high-end laptop with most recent UEFI 😥

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    3. sij

    The video of the talk we gave at Black Hat USA 2019 is now available on YouTube:

    Poništi
  18. proslijedio/la je Tweet
    29. pro 2019.

    My site was flagged again. Therefore, all downloads have been removed until this can be resolved. I've written an article about this here: . I would appreciate any retweets to bring attention to this; it affects all free and open source software developers.

    Prikaži ovu nit
    Poništi
  19. 27. pro 2019.

    Arrived at 36C3 😀

    Poništi
  20. 20. pro 2019.

    I'll be away for xmas/36c3/new years though so release will probably happen early in January.

    Prikaži ovu nit
    Poništi
  21. 20. pro 2019.

    Just got a completely user-settable PCIe configuration space up and running for PCILeech PCIe FPGA devices. Should allow for some interesting future research 😈

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·