+NCR/CRC! [ReVeRsEr]

@crackinglandia

Crazy and disheveled guy!. From Gral. Pico, the World's Capital City of Asado. Big beer drinker. Gently reminder specialist.

RCE world
Vrijeme pridruživanja: srpanj 2009.

Tweetovi

Blokirali ste korisnika/cu @crackinglandia

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @crackinglandia

  1. proslijedio/la je Tweet
    16. sij

    [BLOG] Reverse Engineering a Philips TriMedia CPU based IP Camera - Part 3 by :

    Poništi
  2. 16. sij
    Poništi
  3. Poništi
  4. Let's generate some hype .. I wrote another blog post dedicated to Frida. I'll publish it tonight (ARG time). Stay tuned.

    Poništi
  5. Poništi
  6. proslijedio/la je Tweet
    30. svi 2019.

    Quién recuerda el crackme de Mairena escrito por marciano allá por 2005? Fav en caso afirmativo, RT en caso negativo.

    Poništi
  7. proslijedio/la je Tweet
    29. svi 2019.

    My talk was rejected at BlackHat, should I need to start talking shits about the conference as many infosec rockstars do when they are rejected too? Just let me know :)

    Poništi
  8. The third part of the series about reversing TriMedia is coming soon. Be ready to read the mess about format bits and extension bytes, unpacking and decoding process. It's going to be hard to explain it but even more to read it :P

    Poništi
  9. Recording video from my talk (Philips Trimedia) at NGI event is available now:

    Poništi
  10. Poništi
  11. Just received an old 2Wire router. More Philips TriMedia hardware to play with :) TM32 series.

    Poništi
  12. drstrng updated pype32 to python3 :)

    Poništi
  13. Poništi
  14. Reverse Engineering a Philips TriMedia CPU based IP camera - Part 1

    Poništi
  15. El video de mi charla en ya esta disponible:

    Poništi
  16. proslijedio/la je Tweet
    4. stu 2018.

    . breaks down the intricacies of the Philips TriMedia architecture through the inspection of an IoT device Reverse Engineering Track Briefing

    Poništi
  17. proslijedio/la je Tweet
    13. stu 2018.

    ntoskrnl.exe has an undocumented function, nt!DbgCommandString() that allows a driver of a debuggee to execute commands (so, any code) on the session of the debugger ( -> ). So be careful when debugging untrusted drivers via 😅 Found by

    Poništi
  18. proslijedio/la je Tweet

    Our first three speakers have confirmed their talks🎉 welcome to & Veronika

    Poništi
  19. Poništi
  20. proslijedio/la je Tweet
    20. ruj 2018.

    Reverse engineering an IoT device that uses the little known Phillips TriMedia media processor.. how? Quarkslab Security Engineer Nahuel Riva aka will tell you at the security conference Wednesday, September 26 at 13:50

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·