Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @h0t_max
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @h0t_max
-
Prikvačeni tweet
We've updated our IntelTXE-POC. Now it allows you to bring up the main CPU and use all the amazing features of the Intel VISA technology. https://github.com/ptresearch/IntelTXE-PoC#bringup-main-cpu …pic.twitter.com/QMycSzsT8S
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
[Мастер-класс] DMA-атаки на практике. Эксплоит через прямой доступ к памяти. Практическое занятие по эксплуатации уязвимостей низкоуровневого доступа к оперативной памяти (Direct Memory Access). Дата: суббота 1 февраля 2020 https://neuronspace.timepad.ru/event/1244246/ pic.twitter.com/0dgCUA9lwg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
We've found a bug in CSME on-die ROM!
Intel says it's already targeted by CVE-2019-0090 (https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html …). Security Fuses can be extracted!
Mehlow and Cannon Point chipsets are affected. Stay tuned!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
Hacking Sony PlayStation Blu-ray Drives
#36c3 [SLIDES] https://github.com/oct0xor/presentations/blob/master/Hacking%20Sony%20PlayStation%20Blu-ray%20Drives.pdf …pic.twitter.com/nM0HklOyAO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
Intel Cannon Point chipset (300 series) as well as Apollo Lake and Gemini Lake SoCs have very dangerous Delayed Authentication Mode (DAM) vulnerability allowing arbitrary code execution and the root key prediction. Detailed write-up is coming. Stay tuned.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-2.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
#ePrint SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust: G Leurent, T Peyrin https://ia.cr/2020/014Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
Embargo ends -
#PlunderVolt is public: https://plundervolt.com/ It allows to induce faults into computations in SGX, breaking crypto and corrupting memory. https://www.youtube.com/watch?v=In3B9L5Jyo4 … Great collaboration with Kit Murdock,@sublevado,@halfdoof,@jovanbulck, Frank Piessens!!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
MemProcFS v3.0 finally released
Super fast memory analysis in convenient file system or C/Python API.
Now support Threads, Handles, VADs! Completely rewritten memory core -> way better memory&file recovery rates
https://github.com/ufrisk/MemProcFS …pic.twitter.com/2w9boyJTme
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
This very pictorial scheme proves a link between IOSF Side Band segments of CPU complex and PCH in modern platforms (Cannon Lake, Ice Lake). So, the question is whether now Intel CSME has an access to MEE of Intel SGX which is certainly connected to IOSF SBpic.twitter.com/fFUSKlK0lO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
Bad Binder: Android In-The-Wild Exploit https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
OFFZONE 2020 — April 16-17, Moscow, Russia. Save the date!
Call for Papers is now officially open — get your talk proposals submitted 
https://cfp.offzone.moscow/y2020/
Make sure to check out Speaker Benefits and CFP Principles
https://offzone.moscow/2020-call-for-papers/ …
See you at OFFZONE 2020!pic.twitter.com/71saIMZwG2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
Happy to see more usages of Credential Guard protection in Windows 10 (enterprise/business), with persistance across reboots.
#mimikatz * BCryptIsoKeyData for CNG private keys ; * Credential for domain_password credentials ; * LsaIsoAsymmetricKeyBlob for MachineBoundCertificate.pic.twitter.com/XuCKaUGz7S
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
Intel discloses remote 'privileges escalation' vulnerability in CSME for non-vPro systems (not having AMT module). That's a precedent breaking well recognized assumptions about remote attacks on CSME (CVE-2019-0169):https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Perfect keynote "Hardware Security is Hard: How Hardware Boundaries Define Platform Security" by
@matrosov on@ZeroNights 2019pic.twitter.com/ME1OZWXDbr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
A very interesting work proposing a use of Intel CSME as basis for system integrity check (of hypervisor, smram, os): http://www.cs.wayne.edu/fengwei/paper/nighthawk-esorics19.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
I just did the full disclosure of the exploitable bugs in the 'vivid' driver of the Linux kernel: https://www.openwall.com/lists/oss-security/2019/11/02/1 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
"
#checkm8: The iPhone Exploit That Hackers Use to Research Apple’s Most Sensitive Code" This is what the title of this write-up would be if it was a VICE article. This is a detailed write-up of the vulnerability I found and how the exploit really works.https://habr.com/en/company/dsec/blog/472762/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Today is my last working day at
@ptsecurity, I want to say thanks to@_Dmit,@_markel___,@a13xp0p0v and@qwmfur for pleasant atmosphere, amazing researches, perfect time and discussions.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Maxim Goryachy proslijedio/la je Tweet
Just uploaded the slides for the talk "Building High Performance Security Research Teams" in
#HITBCyberWeek@HITBSecConf - Due to logistics problems the talk did not happen. Thanks@k8em0 for replacing me last minute: You are super!https://bit.ly/hitbcyberweekHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bad news from Dell...https://twitter.com/StevenKister1/status/1180073802878849025 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.