Tweetovi

Blokirali ste korisnika/cu @d_olex

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @d_olex

  1. Prikvačeni tweet
    8. lis 2017.

    I released some part of my DMA attack tools based on Xilinx SP605 evaluation kit to public, enjoy :)

    Poništi
  2. 30. sij

    Got Xilinx ZC706 for 500 euro 🤘 2020 will be a year of Zynq

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    New cache attack against Intel CPUs:

    Poništi
  4. proslijedio/la je Tweet
    27. pro 2019.

    The AMD Secure Processor is a CPU in your CPU you do not control. It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution. At I will present our PSP hacking and how we regained control over it.

    Prikaži ovu nit
    Poništi
  5. 24. pro 2019.

    RE: offensive security tools debate * Rob the rich → fight capitalism; * Commit cybercrime → rob the rich; * Release intrusion tools → help to commit cybercrime; * Release intrusion tools → fight capitalism; You’re welcome

    Poništi
  6. proslijedio/la je Tweet
    19. pro 2019.

    A new set of "Mac firmware security" pages are finally out, thanks to . Check it out, it's what me and my teammates at Apple had beet working on really damn hard for the last several years.

    Poništi
  7. 16. pro 2019.
    Poništi
  8. 11. pro 2019.

    At least it will be accurate reflection of current objective reality, because I don’t have other explanations of this crap 🤯🤮

    Prikaži ovu nit
    Poništi
  9. 11. pro 2019.

    CVSS v4.0 will have «vulnerability has fancy name and dedicated web page» and «vulnerability discovered by security company» options which automatically boosts its rate to high/critical despite of other metrics

    Prikaži ovu nit
    Poništi
  10. 6. pro 2019.

    Although option ROM attacks are [almost] mitigated on modern platforms this feature still could be useful for security audit and prototyping in certain cases (TOCTOU attacks, firmwares with legacy code base or weak secure boot, etc.)

    Prikaži ovu nit
    Poništi
  11. 6. pro 2019.
    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    5. pro 2019.

    D. Lee et al., “An Off-Chip Attack on Hardware Enclaves via the Memory Bus” […critical page whitelisting, cache squeezing, and oracle-based fuzzy matching algorithm to increase cache misses for memory accesses…SGX...leak confidential data…]

    Poništi
  13. proslijedio/la je Tweet
    9. stu 2019.

    Apple vs. Corellium Unredacted version of Corellium’s legal answer is public This entire lawsuit is an obvious attempt to decreases the value of Corellium to either 1) own them, or 2) put them out of business to prevent researchers from finding bugs

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    4. stu 2019.

    After more than half a year of work, check out our latest paper Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems. More details at Joint work with Takeshi Sugawara, Benjamin Cyr, Daniel Genkin, and

    Poništi
  15. 3. stu 2019.

    Also they’re starting to roll out new Chrome version which kills 3-rd party ad blockers and privacy extensions Uninstall Chrome and stop using Google services

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    Corellium’s answer to Apple lawsuit (non-paywall PDF)

    Poništi
  17. proslijedio/la je Tweet
    28. lis 2019.

    I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB:

    Prikaži ovu nit
    Poništi
  18. 17. lis 2019.

    Action movie plot: in the future superscalar resistance sends weaponized cyborg back in time to stop Intel from killing IA-64

    Poništi
  19. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  20. 15. ruj 2019.

    cat 3gpp_org/specifications/something > brand-new-vuln-name_com echo sales@company-name_com >> brand-new-vuln-name_com

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·