Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @al3xtjames
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @al3xtjames
-
Prikvačeni tweet
Yep, found SmmRuntimeManagementCallback() function in HP dv7 4087cl (from ~2010, HM55) with Insyde EFIpic.twitter.com/M5jrsrAO8d
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).https://github.com/axi0mX/ipwndfu
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
STOP using single-purpose instructions MOV is Turing complete XOR is Turing complete SUB is Turing complete (CMP)XCHG is Turing complete JMP ADC is Turing complete
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
[GSoC] Ghidra firmware utilities, week 9https://blogs.coreboot.org/blog/2019/07/24/4743/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
CVE-2018-12169: Platform sample code firmware included with Haswell, Broadwell, Skylake, Kaby Lake, Coffee Lake and Cannon Lake processors contains a logic error allowing a physical attacker to bypass BootGuard firmware authentication. https://edk2-docs.gitbooks.io/security-advisory/content/unauthenticated-firmware-chain-of-trust-bypass.html …pic.twitter.com/8cErlL7qyE
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[1] 3996 segmentation fault grep uh
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
looks like some people actually care about AMD's PSP: http://seclists.org/fulldisclosure/2018/Jan/12 … BTW, ME also has an fTPM and is also mostly based on the spec's pseudocode... cc
@h0t_max@markHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
Attacking
#IntelME by@h0t_max &@_markel___ at#BHEU 1. Requires malformed file on SPI flash (needs physical access or bug in BIOS) 2. Bug in early-loaded module, so ME "disabling" by HAP is not a cure 3. Culprit is classic(!) stack overflow 4. Full code exec in ME Congrats!pic.twitter.com/own7OZCgxg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hmm, why are AppleBCMWLAN*.kext included in 10.13? Aren’t these for iOS devices?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
Saying you don’t need internet access to succeed in 2017 in the US is kind of like saying you can do anything in life regardless of your economic status growing up...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
Just a humble reminder to everyone freaking out by INTEL-SA-00086 aka total ME takeover: ME is a core of fTPM 2.0, BootGuard, SGX, PAVP, ICC, DAL and who knows what else on modern Intel platforms, so you you want to freak out - do it harder! ;)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
Thoughts on the latest Intel ME vulnerabilities: based on public information, we have no real idea how serious this is yet. It could be fairly harmless, it could be a giant deal.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
the Apocalypse begins: Multiple buffer overflows in Intel CSME including with remote vectorhttps://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
Fix for our vulnerability has been published!!! CVE-2017-5705
@intel thank you!https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
Current state of fixed Intel CSE firmware found for INTEL-SA-00086 vulnerabilities https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr …. Detection tool https://downloadcenter.intel.com/download/27150 . Updated CSME firmware https://www.win-raid.com/t596f39-Intel-Management-Engine-Drivers-Firmware-amp-System-Tools.html#msg10191 …pic.twitter.com/Zsw6tSZDCV
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
There's a LOT of new things happening with Apple EFI in the upcoming BridgeOS 2 thought to ship with the iMac Pro it looks like. New EFI update kext, MacEFI* libs, and seemingly use of eSPI which I *believe* is new. Aforementioned binaries are AArch64, incidentally.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
And MacEFI in this new world is definitely shipping in img4 format, and decoded and verified at various steps.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DCI works fine on Kaby Lake XPS 15 (with UEFI variable edits, of course)pic.twitter.com/0fG6d0YsEg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
CSME 11.8.50.3425 seems to fix CVE-2017-9765, CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-5705, CVE-2017-5708, CVE-2017-5711, CVE-2017-5712 & CVE-2017-5729. So WPA2 and CSE ME 11, TXE 3 & SPS 4 vulnerability https://www.blackhat.com/eu-17/briefings/schedule/index.html#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668 … (disclosure probably on Nov 20th)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
Game over! We (I and
@_markel___ ) have obtained fully functional JTAG for Intel CSME via USB DCI.#intelme#jtag#inteldcipic.twitter.com/cRPuO8J0oG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
alex proslijedio/la je Tweet
We're glad to share another Intel Boot Guard bypassing technique https://twitter.com/_embedi_/status/915974703772205056 …
Tweet je nedostupan.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.