-
Slides of CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems: https://github.com/n3k/CansecWest2016_Getting_Physical_Extreme_Abuse_of_Intel_Based_Paging_Systems …
@NicoEconomou#CanSecWest -
#CanSecWest slides posted: http://legbacore.com/Research.html -
My TPM Genie repo is now live at https://github.com/nccgroup/TPMGenie …. Here you can find my white paper as well as TPM Genie itself: interposer firmware, hardware build plan, usage instructions, and a number of attack PoCs which I demoed today.
#CanSecWest -
Pwn a Nexus device with a single vulnerability : https://github.com/secmob/cansecwest2016/blob/master/Pwn%20a%20Nexus%20device%20with%20a%20single%20vulnerability.pdf … (Slides)
#CanSecWest -
Used
@CHIPSEC at#CanSecWest presentation for finding FW/HW vulns, VMM attacks, detect implants (like https://securingtomorrow.mcafee.com/business/chipsec-support-vault-7-disclosure-scanning/ …)//cc@c7zero -
The border guard BIOS attack, one screw, one button press, wait for the green light.
#CanSecWest#csw15pic.twitter.com/dwKa0hmwZi
-
Just released a new tool for reverse engineering Ethereum smart contracts: ida-evm, an IDA Pro processor module https://github.com/trailofbits/ida-evm …
#cansecwest -
DMA into SMM on high-end servers using
#PCILeech. Interesting#CanSecWest prez https://www.slideshare.net/CanSecWest/privilege-escalation-on-highend-servers-due-to-implementation-gaps-in-cpu-hotadd-flow … -
“Shellcodes are for the 99%” https://sites.google.com/site/bingsunsec/shellcodes-are-for-the-99 …, Bing has released the slides for
#CANSECWEST talk, be sure to check it out, it’s cool! -
The ARM IoT Exploit Lab returns to
#Cansecwest 2019 with newer complex hardware targets and all new firmware extraction and emulation. https://cansecwest.com/dojos/2019/exploitlab.html … Day 4 of training shall be a free form exercise day with 4 hardware targets to exploit. RTs appreciated Cc@dragosr -
Slides for Xiaoning & me's preso @
#CanSecWest#csw15 "Smart COM Fuzzing: Auditing IE Sandbox Bypass in COM Objects" https://sites.google.com/site/zerodayresearch/Smart_COM_Fuzzing_Auditing_IE_Sandbox_Bypass_in_COM_Objects_final.pdf … -
Here are the original slides from my
#CanSecWest 2017 talk in March. https://www.slideshare.net/i0n1c/cansecwest-2017-portal-to-the-ios-core … -
New Paper: Dylib hijacking on OS X, by
@patrickwardle, speaking on this topic at#CanSecWest right now https://www.virusbtn.com/virusbulletin/archive/2015/03/vb201503-dylib-hijacking … -
I am teaching two classes "Offensive PowerShell" and "Active Directory Attacks" at
#CanSecWest this year. Obviously, on different dates :P https://cansecwest.com/dojos/2018/powershell.html … https://cansecwest.com/dojos/2018/powerpen.html … -
Abusing one and a half
#Chrome features for RCE on Android! You can now check our#CanSecWest slides. https://www.slideshare.net/CanSecWest/csw2017-geshevmiller-logic-bug-hunting-in-chrome-on-android …#Pwn2Ownpic.twitter.com/PWQDw0j5Cf
-
W10 TH2 + running in LIL + two-byte arbit.write +
#CanSecWest 2016 = 0x41414141 ... with@kiqueNissim next week :-Dpic.twitter.com/IPf4OQcONN
-
Come for the swag, stay for the drinks.
#CanSecWest pic.twitter.com/Qc5oYiv6ne
-
Our adventures at
@thezdi Pwn2Own Desktop 2018 for Apple Safari exploit whitepaper (https://labs.mwrinfosecurity.com/assets/BlogFiles/apple-safari-pwn2own-vuln-write-up-2018-10-29-final.pdf …) and@t2.fi slides release (https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-t2-big-game-fuzzing-pwn2own-safari-final.pdf …) by@munmap@pwnfl4k3s and@alexjplaskett.#t2infosec#cansecwest -
Slides "A new class of vulnerability in SMI Handlers of BIOS/UEFI Firmware" from
#CanSecWest 2015 is online https://cansecwest.com/slides/2015/A%20New%20Class%20of%20Vulnin%20SMI%20-%20Andrew%20Furtak.pdf …@CHIPSEC
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.