-
Slides of CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems: https://github.com/n3k/CansecWest2016_Getting_Physical_Extreme_Abuse_of_Intel_Based_Paging_Systems …
@NicoEconomou#CanSecWest -
#CanSecWest slides posted: http://legbacore.com/Research.html -
My TPM Genie repo is now live at https://github.com/nccgroup/TPMGenie …. Here you can find my white paper as well as TPM Genie itself: interposer firmware, hardware build plan, usage instructions, and a number of attack PoCs which I demoed today.
#CanSecWest -
What can Eclypsium’s firmware security experts teach you at the
#CanSecWest 2020: Security Masters Dojo? Firmware implants, the attack vector that is gaining momentum. Register for Practical Firmware Implants http://bit.ly/2tlfiIs pic.twitter.com/GPODww8Ygp
-
Don’t miss Eclypsium’s firmware security courses at
#CanSecWest 2020. For information and to register go to Mar 14-15 Practical Firmware Implants- http://bit.ly/2SaBCwy and Mar 16-17 Finding Firmware Implants-http://bit.ly/38StDuQ pic.twitter.com/QnsQbdA7yn
-
The results from
#Pwn2Own Day Two are here. We awarded $270,000 for 9 different bugs in Mozilla#Firefox, Microsoft#Edge &#Windows, and#VMware Workstation. Read the details at http://bit.ly/2TRTwbl#cansecwest -
Post
@offensive_con ARM exploitation challenges for students and non-students alike: warm up#DVAR Damn Vulnerable ARM Router: https://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html … Next smash the ARM ROP challenge: https://blog.exploitlab.net/2018/03/dvar-rop-challenge-bonus-round-unlocked.html … Next ARM IoT Exploitlab#cansecwest https://cansecwest.com/dojos/2019/exploitlab.html … pic.twitter.com/1AOMzSKUYR
-
Finally made it to Berlin for
@offensive_con this week, it’s inaugural event was my favorite of 2018 so I have high hopes the@bluefrostsec team will have a successful repeat. Tickets on sale now for#CanSecWest and@HITBSecConf Amsterdamhttps://twitter.com/richinseattle/status/1088869670273216512 … -
The ARM IoT Exploit Lab returns to
#Cansecwest 2019 with newer complex hardware targets and all new firmware extraction and emulation. https://cansecwest.com/dojos/2019/exploitlab.html … Day 4 of training shall be a free form exercise day with 4 hardware targets to exploit. RTs appreciated Cc@dragosr -
Our adventures at
@thezdi Pwn2Own Desktop 2018 for Apple Safari exploit whitepaper (https://labs.mwrinfosecurity.com/assets/BlogFiles/apple-safari-pwn2own-vuln-write-up-2018-10-29-final.pdf …) and@t2.fi slides release (https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-t2-big-game-fuzzing-pwn2own-safari-final.pdf …) by@munmap@pwnfl4k3s and@alexjplaskett.#t2infosec#cansecwest -
“Shellcodes are for the 99%” https://sites.google.com/site/bingsunsec/shellcodes-are-for-the-99 …, Bing has released the slides for
#CANSECWEST talk, be sure to check it out, it’s cool! -
Puh, just got home from two intense conference weeks in Cancun (@TheSAS2018) and Vancouver (
#CanSecWest). Made some unforgettable and unexpected experiences, which made me realize how freaking awesome working in this field and being part of the InfoSec community actually is. pic.twitter.com/zHgyrb0Sou
Prikaži ovu nit -
Just released a new tool for reverse engineering Ethereum smart contracts: ida-evm, an IDA Pro processor module https://github.com/trailofbits/ida-evm …
#cansecwest -
Going to be doing my first training at
#CanSecWest this March! I’m planning on a two day hands-on dojo on WinDbg reversing, forensics and automated vulnerability analysis using NatVis, JS, TTD and legacy scripting/extensions (as little as possible). Details to come... -
#CanSecWest 2018#ARM#ExploitLab updates
New course description posted
Added 3 new hardware targets - routers and ipcams
New shellcode and ARM ROP
And the best update:
@Fox0x01 joins me as a co-instructor! Register at https://cansecwest.com/dojos/2018/exploitlab.html … cc@dragosr@secwestpic.twitter.com/gDli3nRBWs
-
Here are the original slides from my
#CanSecWest 2017 talk in March. https://www.slideshare.net/i0n1c/cansecwest-2017-portal-to-the-ios-core … -
Abusing one and a half
#Chrome features for RCE on Android! You can now check our#CanSecWest slides. https://www.slideshare.net/CanSecWest/csw2017-geshevmiller-logic-bug-hunting-in-chrome-on-android …#Pwn2Ownpic.twitter.com/PWQDw0j5Cf
-
DMA into SMM on high-end servers using
#PCILeech. Interesting#CanSecWest prez https://www.slideshare.net/CanSecWest/privilege-escalation-on-highend-servers-due-to-implementation-gaps-in-cpu-hotadd-flow … -
VM escape earns hackers $105K at
#Pwn2Own http://bit.ly/2nvVJIL#CanSecWest pic.twitter.com/SlChzTU2q8
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.