Corey Kallenberg

@coreykal

post exploitation exploitation research

Vrijeme pridruživanja: kolovoz 2013.

Tweetovi

Blokirali ste korisnika/cu @coreykal

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @coreykal

  1. proslijedio/la je Tweet
    18. svi 2016.

    @Intel_UEFI Got it encoded, hope 6 seconds can be considered a fair use quote. UEFI FTW!

    Poništi
  2. proslijedio/la je Tweet
    27. sij 2016.

    Tool to rip apart BIOS images for analysis. And VirusTotal now does Firmware! :-)

    Poništi
  3. proslijedio/la je Tweet
    9. stu 2015.

    interesting (and no-doubt unexpected) fact: today was and my first day as full time employees of Apple!

    Poništi
  4. proslijedio/la je Tweet
    6. ruj 2015.

    UEFITool 0.21.0 is out: added support for new flash descriptor format used in Skylake, fixed some minor bugs. Big thx to lordkag once again.

    Poništi
  5. 19. kol 2015.

    FYI for anyone who is interested in UEFI security issues, you should definitely also be following

    Poništi
  6. proslijedio/la je Tweet
    6. kol 2015.

    We didn't think Corey would win over Rowhammer, so I didn't prepare any comments when I accepted for him :-/

    Poništi
  7. 6. kol 2015.
    Odgovor korisniku/ci

    ...And thanks to the @Intel_UEFI guys who spent a lot of time handling a pretty complicated disclosure situation

    Poništi
  8. 6. kol 2015.

    Thanks to all the judges who accepted my bribes at

    Poništi
  9. proslijedio/la je Tweet
    6. kol 2015.

    Congratulations to LegbaCore co-founder for winning the 2015 for best privilege escalation

    Poništi
  10. proslijedio/la je Tweet
    3. kol 2015.

    A video by Trammell Hudson of spreading OS->boot flash->OROM->other laptop boot flash is here:

    Poništi
  11. proslijedio/la je Tweet
    3. kol 2015.
    Poništi
  12. proslijedio/la je Tweet
    3. kol 2015.

    Researchers have created a firmware worm that attacks Macs

    Poništi
  13. 23. srp 2015.

    training will include new material from our recent foray into Mac EFI... Learn how to hack/integrity check your Mac's firmware

    Poništi
  14. proslijedio/la je Tweet
    22. srp 2015.

    People worth following on twitter if you're interested in firmware security:

    Poništi
  15. proslijedio/la je Tweet
    21. srp 2015.

    Macs are in fact vulnerable to many software-only firmware attacks - Briefing by , &

    Poništi
  16. 21. srp 2015.
    Odgovor korisniku/ci

    Learn how some vendor's firmware devs havent figured out "i dont invoke this code" doesnt equal "attacker can't invoke this code"

    Poništi
  17. 21. srp 2015.

    Novel content from the thunderstrike2 presentation will be reserved for . Specifically something I refer to as "BIOS Necromancy"

    Poništi
  18. proslijedio/la je Tweet
    21. srp 2015.

    Only LebgaCore makes *trustworthy* BIOS integrity checking capabilities, so don't hold your breath for security vendors catching this either

    Poništi
  19. proslijedio/la je Tweet
    21. srp 2015.

    Since ppl don't check firmware, they would never find something like this (if and we weren't releasing helpful tools)

    Poništi
  20. proslijedio/la je Tweet
    21. srp 2015.

    The novel "firmworm" never touches the main OS memory or disk. It lives *only* in firmware.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·