Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @flothrone
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @flothrone
-
Alexander Ermolov proslijedio/la je Tweet
I am quite exhausted from the sheer complexity of the
#firmware research I have been doing, having just spoken about the@intel ME at@fosdem. Now it's your turn: Please look into it as well and post your follow-up insights!
Slides: https://metaspora.org/look-at-me-fosdem20.pdf …
Video will follow.pic.twitter.com/U75LfQZqXt
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
Untrusted Roots: exploiting vulnerabilities in Intel ACMs by
@flothrone https://www.offensivecon.org/speakers/2020/alexander-ermolov.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
Slightly late, but here's the slides to my
#36C3 talk: https://pbx.sh/intelme_talk.pdf … . Contains some useful bonus slides and links, somewhere in the next few days I will add more references to prior work on this subject.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
A new set of "Mac firmware security" pages are finally out, thanks to
@XenoKovah. Check it out, it's what me and my teammates at Apple had beet working on really damn hard for the last several years.https://support.apple.com/guide/security/uefi-firmware-overview-seced055bcf6/web …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
Check it out for more about the first-in-the-world work
@CoreyKal & Rafal Wojtczuk have done for UEFI DMA protection and UEFI sandboxing of PCIe Option ROMshttps://twitter.com/radian/status/1197990878540775424 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
"
#checkm8: The iPhone Exploit That Hackers Use to Research Apple’s Most Sensitive Code" This is what the title of this write-up would be if it was a VICE article. This is a detailed write-up of the vulnerability I found and how the exploit really works.https://habr.com/en/company/dsec/blog/472762/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
(
#platformsec19 video) The Evolution of Advanced Threats: REsearchers Arms Race — Alex Matrosov, Nvidia https://www.platformsecuritysummit.com/2019/speaker/matrosov/ …@matrosov@nvidia@halvarflake@uffeux@qrs@flothrone@coreboot_org@osfc_io@OpenComputePrj#uefi#firmware#securitypic.twitter.com/dXwDbvwIMi
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
checkm8-arduino PoC - the checkm8 port for Arduino and USB Host Shield. https://github.com/DSecurity/checkm8-arduino …
#Checkm8pic.twitter.com/T5SA2AZf0d
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
I've started writing a series of articles about reverse engineering the Management Engine, I've just uploaded the first two: https://pbx.sh/intelme-sw1/ , andhttps://pbx.sh/intelme-sw2/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).https://github.com/axi0mX/ipwndfu
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
We've just released a new paper "New Memory Type Against Speculative Side-Channel Attacks". Read it here: https://bit.ly/nonspecmemtype
@wildsator@bsdaemon@Kekai_Hu#WeAreSTORM@IntelSTORMTeamHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
Some new bug of mine: AMD Radeon Shader Functionality Remote Code Execution - https://blog.talosintelligence.com/2019/09/vuln-spotlight-AMD-Radeon-ATI-sept-19.html … https://www.amd.com/en/corporate/product-security …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
lpe is a collection of verified Linux kernel exploits. Exploit testing is fully automated. Feel free to make a pull request with a new exploit to see it by yourself
The end goal is to collect all public exploits that actually work.https://github.com/jollheef/lpe Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
[CPR-Zero] CVE-2019-1159 (Windows 10 Kernel): Use-After-Free in the GetDCEx function in win32kfull.sys.https://cpr-zero.checkpoint.com/vulns/cprid-2132/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our
#BHUSA research with Alexandre Gazet. HW/FW Security != Summary of all Security Boundarieshttps://medium.com/@matrosov/firmware-security-boundaries-85807d3fe604 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je Tweet
@flothrone presents a flaw in the UEFI microcode loader which tricks it into downgrading the CPU microcode, opening up exploitation of patched vulnerabilities in Authenticated Code Modules and the bypassing of hardware-based trusted/measure boot#HITBGSEC https://gsec.hitb.org/sg2019/sessions/bypassing-hardware-based-trusted-boot-through-x86-cpu-microcode-downgrade/ …pic.twitter.com/SPBqu5o7Ed
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Alexander Ermolov proslijedio/la je Tweet
Reading Inside The Apple T2 by
@sirus &@jlericks ... https://i.blackhat.com/USA-19/Thursday/us-19-Davidov-Inside-The-Apple-T2.pdf … [PDF]pic.twitter.com/1DRxsxZNwH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alexander Ermolov proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.