dragosr

@dragosr

Stop, Think, Pwn!

Vortex of Cool
Joined December 2008

Tweets

You blocked @dragosr

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @dragosr

  1. 23 hours ago

    After a string of not quite spectacular ones, this one is cool. Using RAM accesses to create WiFi signals receivable with nearby WiFi HW.

    Undo
  2. Dec 13

    How .gov was popped, using SolarWinds. A write up worth reading, for a raised eyebrow about the low and slow obfuscations of nothing else, 12 day timers, command channels encoded in .net-ish http, etc...

    Undo
  3. Retweeted
    Dec 9

    Red Teamers - why not use 's signed launcher to execute your code? Simply edit launcher-configuration.json and copy your payload anywhere within the root directory 😉

    Show this thread
    Undo
  4. Retweeted
    Dec 6

    I created a tool for recovering passwords from pixelized images:

    Undo
  5. Dec 7

    It may not be your custom, but it is mine. Ring a bell, have a shot for you old friend.

    Undo
  6. Dec 4
    Undo
  7. Dec 4

    In a couple of hours (9 am PST) we’ll be streaming out the PACSEC AI and Security Panel - Part 2 here and on YouTube.

    Undo
  8. Retweeted
    Dec 3

    Ransom letter that’s been rolling off the printers at . Sources tell me, at this point, does NOT intend to pay. But a cyber security expert we spoke to says this is a sophisticated new type of ransomware attack... and many victims do pay.

    Undo
  9. Nov 23

    Reading this thread is something I needed today. Maybe it will help pick you up too.

    Undo
  10. Nov 19

    Real, useful, holographic displays are upon us. Demo @ China High Tech Fair going on now in Shenzen. Perfect keypad product for places that can’t get COVID under control. Envious of places where folks trust medical science, public health enough to have trade shows safely now.

    Undo
  11. Retweeted

    Testing a new USB armory Mk II revision 😀

    Undo
  12. Nov 13

    RISC-V support in newly released version of Ghidra.

    Undo
  13. Nov 10

    This is the relevant paragraph from the Ethernet RF data exfiltration source: “This works by switching between 10Mbps and 100Mbps ... Switching to 100Mbps produces a signal at 125MHz, which is used to transmit morse code.”

    Undo
  14. Nov 9

    Started doing youth classes today, a new thing. Eager, curious, young minds @ Hacker Highschool's "Cybersecurity for Teens" - basic DNS, ip, public/private, routers/nat, interfaces, tracert, Good interactivity - Vince & Bob awesome/patient instructors.

    Undo
  15. Nov 9

    RF data exfiltration from airgapped systems using Ethernet cable as an antenna, and nic as modulator, receiver at 100m. Only the early days of this kind of stuff.

    Undo
  16. Nov 8

    I just uploaded “PACSEC: New Security Challenges of RISC-V - The Future” to :

    Undo
  17. Nov 8
    Undo
  18. Nov 8
    Undo
  19. Nov 8

    In an hour from now I'm going to be chatting with and on the PACSEC streams about SDR, RF, and WiFi things...

    Undo
  20. Nov 8

    Tonight at 21:00PST after PACSEC SDR/WiFi/RF-Tools Panel I'm going to have a chat with Don A. Bailey about New Challenges of RISC-V Security. Inviting folks interested in this major new arch security to join us. Again ping me @ -> discord general channel.

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·