Mickey

@HackingThings

Hacker, bricker of things, cluster head. quality shitposts. opinions are my own.

United States
Vrijeme pridruživanja: travanj 2013.

Tweetovi

Blokirali ste korisnika/cu @HackingThings

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HackingThings

  1. Prikvačeni tweet
    30. lis 2016.

    Using inception over the air , thank you Wireless Bus Extensions.

    Poništi
  2. proslijedio/la je Tweet
    prije 10 sati

    1/ I can finally share the exploit demo video for CVE-2020-6007: TL;DR: We managed to infiltrate into a computer network using an over-the-air Zigbee exploit on the Philips Hue Bridge (smart lightbulbs controller).

    Prikaži ovu nit
    Poništi
  3. prije 4 sata

    Found on eBay, SKL RVP board. SPI wasn’t wiped 😁

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    CVE-2019-19705 - A vulnerability which I found in Realtek's Driver package for Windows, which affects a lot of PC users:

    Poništi
  5. proslijedio/la je Tweet
    prije 23 sata

    Confessions of a Hacker: The Story. Live premiere at 12pm PST on February 6! I've never let a camera crew this much into my life. What could go wrong?

    Poništi
  6. 2. velj

    Me during the Super Bowl

    Poništi
  7. 1. velj

    That’s the most red team thing I’ve ever heard 😂

    Poništi
  8. 31. sij

    What is this? 1. Tip cleaning sponge. 2. A tasty cracker.

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Come work with an awesome research team on firmware and hardware threats!

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    My Reverse Engineering C++ Binaries Training will be part of in 😁

    Poništi
  11. proslijedio/la je Tweet
    30. sij
    Odgovor korisniku/ci

    Another (old) example of remote DMA attack using a vulnerable NIC:

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    We at have just released a great research paper on vulnerabilities in Azure Cloud, practically breaking the isolation of Azure Functions (MS Lambda equivalent). Kudos to for an amazing work!

    Poništi
  13. proslijedio/la je Tweet
    30. sij

    What happened when & looked at HP & Dell laptops for DMA vulnerabilities? They found some. Join them for a Q&A on Feb. 5 to hear more and ask questions. Register here: . ,

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    "The actual adoption and correct uses of these features in the hardware …lags significantly behind when the feature is introduced in the marketplace,” .

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. sij

    New --> Why direct-memory attacks on laptops just won't go away

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    30. sij

    I brought one hundred NFC Type 5 microcontroller boards to Shmoocon, which are OTA programmable from Android. You can have one for free if you install the compiler toolchain documented on the Github page.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    30. sij

    Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, and show that high speed DMA attacks can bypass hardware protections on enterprise devices.

    Poništi
  18. proslijedio/la je Tweet
    30. sij

    has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find. Early 🐦 prices are still available at ! Register now ➡️ RTs appreciated!

    Poništi
  19. proslijedio/la je Tweet
    29. sij

    Want to learn about reverse engineering and breaking hardware, but don't know where to start? My 2-day Hardware Hacking Basics class returns for both the weekend and weekday sessions! and

    Poništi
  20. proslijedio/la je Tweet
    30. sij

    Our research team is growing. If you're interested in developing detection methods for PC firmware threats and vulnerabilities, send your resume/CV to careers@eclypsium.com. Portland, USA or Córdoba, Argentina preferred. DMs open for questions.

    Poništi
  21. proslijedio/la je Tweet
    30. sij

    Going to but don't have a ticket? You're in luck as the Oracle Cloud Infrastructure Red Team fought the F5 war and has emerged with an extra ticket! Find Thursday night at lobbycon and tell him about this tweet to receive your barcode and admission into the con!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·