Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
Perfect keynote "Hardware Security is Hard: How Hardware Boundaries Define Platform Security" by
@matrosov on@ZeroNights 2019pic.twitter.com/ME1OZWXDbr
-
News: Intel will release a new stepping for Apollo Lake SoC. But for this platform we: 1. published the ME-jtag exploit 2. revealed that Orange Unlock gives JTAG for the ME 3. got full access to Intel VISA Our advice: hurry up to buy the current stepping. https://www.tomshardware.com/news/intel-apollo-lake-refresh-degradation-cpu-failure,40362.html …pic.twitter.com/sVaEhzHofg
-
I won the auction and Richard Stallman sold me his
#GNU mascot! "Happy Hacking!" (ɔ)pic.twitter.com/GXE0dDWPhb
-
[1/3] So,
#Blackhat has finally published "Behind the Scenes of Intel Security and Manageability Engine": https://i.blackhat.com/USA-19/Wednesday/us-19-Hasarfaty-Behind-The-Scenes-Of-Intel-Security-And-Manageability-Engine.pdf …. Let's see what we can find out?pic.twitter.com/BRYzOwv1Dm
Prikaži ovu nit -
The video of our talk "Intel VISA:Through the Rabbit Hole" at
#OFFZONE 2019 released! [rus] https://www.youtube.com/watch?v=H9jt2CZwwZA …pic.twitter.com/unYvSWd7i2
Prikaži ovu nit -
Thanks to
@matrosov,@vxradius and@sergeybratus for the perfect book! And special thanks to@honorary_bot for free delivery;)pic.twitter.com/nzLXQ36gZq
-
-
The vulnerabilities (include unauthenticated RCE) in ZTE firmware discovered by me in 2018 has been finally disclosed on InfoSecurity Europe in London by Jimmy Jones. As of August 2018, I found the hundreds of thousands of vulnerable devices. https://www.infosecurityeurope.com/en/Sessions/77595/ZTE-Router-Vulnerabilities-A-Demonstration-on-the-Security-Risks-of-the-IoT …pic.twitter.com/G71GHKKqE4
Prikaži ovu nit -
2/2 New portions of Intel vulnerabilities: The new RCE critical vulnerability in CSME 12. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html …pic.twitter.com/THMk6Xg00a
Prikaži ovu nit -
Just two facts: 1.The site hosting the Intel presentation with info about CPU-unlock(special ID/PASS for chips unlocking, allowing to bypass almost all CPU/PCH security features) went down one week before our
#BlackHat talk 2.The Intel presentation has gone from@internetarchivepic.twitter.com/nRh10uQ4T0
-
We've updated our IntelTXE-POC. Now it allows you to bring up the main CPU and use all the amazing features of the Intel VISA technology. https://github.com/ptresearch/IntelTXE-PoC#bringup-main-cpu …pic.twitter.com/QMycSzsT8S
-
Funny Intel's internal guide for impedance measuring of CPU: scalping, soldering, glue and tape;) http://www.keenlit.com/wp-content/uploads/2018/03/IFDIM-BKM-1.pdf …pic.twitter.com/5EzmHUsvjK
-
Thanks to
@ZTEPress for the Amazon gift card (presented for the reported vulnerability: http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1009383 …) I've bought the nice books.pic.twitter.com/jXkJ98xuZd
-
ZTE has announced some of the devices that are affected by unauthorized RCE vulnerability which I found. Unfortunately, this firmware is end of life. Forever 0-days;) http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1009383 …pic.twitter.com/16YoZdSTAc
-
-
Intel fixes another one vulnerability in Intel ME (which we found). https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00125.html …pic.twitter.com/s5kwEqD62P
-
Almost year has passed since we reported the INTEL-SA-00086 vulnarability and we have published JTAG activation PoC for Intel ME. You can use JTAG for researching ME core (via DbC debug cable). Step-by-step instructions at https://github.com/ptresearch/IntelTXE-PoC …pic.twitter.com/9lCJPYfLBF
-
The first public results of my short ZTE GPON research: http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1009383 …. ZTE support is strange: 1. no firmware for downloading from the site 2. security advisory without CVE reserved, CVSS-ratings and affected versions.pic.twitter.com/OG3PzyHnK7
-
I accidentally found a new presentation about Intel ME (vPro) by Intel. A review of new capabilities, a indirect proof of the relationship between SGX and Intel ME. https://www.intel.ru/content/dam/www/public/emea/ru/ru/documents/resellers/vpro-latest-updates.pdf …pic.twitter.com/7q54jpgAl5
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.