-
I’m at the
#INFILTRATE19 security con this week in Miami woot woot!!! pic.twitter.com/VSXeuUyeqF
-
Listening to an excellent keynote by
@window at@InfiltrateCon. She mentioned a young hardware hacker who preferred to drink root beer at 2621. I assume she was referring to@joegrand? :D#INFILTRATE19 -
#INFILTRATE19 takeaways: - I’m still really bad at linux shellcode - I’m still super awesome at karaoke -@tiraniddo is still plumbing the depths of COM - Stack overflows are still a thing in like, a lot of things - Metal detectors have Wifi, empty default passwords, and run JavaPrikaži ovu nit -
Blue Frost Security researcher Eloi (
@esanfelix) kicking off his talk about TEE exploitation at#INFILTRATE19 pic.twitter.com/WxwkMnrthP
-
Are you at
#INFILTRATE19 ? Come and say hello to@Fist0urs and@Karion_pic.twitter.com/4WmFXqm7ex
-
Really wishing I was at
#INFILTRATE19 :( To the lucky peeps attending, be sure to check out@RaytheonCyber's Hack Race challengepic.twitter.com/pepg9x9TFn
-
Video of my &
@0xJeremy's@InfiltrateCon#INFILTRATE19 presentation on Ghidra is now online. 75% of this presentation was live tutorials, so watching the video is best the way to experience it. https://vimeo.com/335158460 pic.twitter.com/Z6TgRfgUk3
Prikaži ovu nit -
As mentioned in my
@InfiltrateCon#INFILTRATE19 presentation with@0xAlexei, here are common IDA Pro keybindings ported to#Ghidra - https://github.com/JeremyBlackthorne/Ghidra-Keybindings …pic.twitter.com/LMyUe6UPpc
-
“The Bug” has been patched! CVE-2019-2832 has been assigned and the Oracle CPU is out. Here’s the fascinating story of a cute 0day that lasted 18 years, as presented at
#INFILTRATE19: https://vimeo.com/335197685 And here’s the patch: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html#AppendixSUNS … https://support.oracle.com/epmos/faces/DocContentDisplay?id=2560938.1 … -
We just published the slides for the TEE presentation
@esanfelix gave at#zer0con2019 and#infiltrate19, and kicking off part 1/4 of a blog post series about this research. https://labs.bluefrostsecurity.de/blog/2019/05/27/tee-exploitation-on-samsung-exynos-devices-introduction/ … -
LEXFO is at
#INFILTRATE19 in Miami! Come and meet our experts@Nikaiw@__brendel@DDXhunter :)pic.twitter.com/xm65IjFWC4
-
Video release:
@0xdea#INFILTRATE19 talk: A Bug’s Life: Story of a Solaris 0day - (Marco Ivaldi) https://vimeo.com/335197685 :) -
I really enjoyed the
#INFILTRATE19 security con. It’s smaller crowds but high level talks. Great stuff. As a bonus, I took a bump from my flight home and made $600. 3 hr wait until next flight
$200/hr. I’ll take that. -
Back home after an awesome time at
#INFILTRATE19 Met really nice and smart people & learnt a lot of cool stuff Super glad to have been able to attend and speak there! :) -
crap photo, amazing talk. Super excited to be at
@_niklasb and@bkth_ ‘s JavaScript Fuzzing talk at#INFILTRATE19! pic.twitter.com/dBHFkL5SgK
-
Next up at
#INFILTRATE19 is@tiraniddo - Having fun* with COMpic.twitter.com/hWr0gMvsLc
Prikaži ovu nit -
Three Heads Are Better Than One: Mastering NSA's Ghidra Reverse Engineering Tool
#Infiltrate19 [SLIDES] by@0xAlexei and@0xJeremy https://github.com/0xAlexei/INFILTRATE2019 …pic.twitter.com/3jPKWNdnR3
-
Dinner tonight at
@InfiltrateCon#INFILTRATE19 Bartender: what will you have? Me: what goes good with gator? Bartender (deadpan): Gatorade...#dadjokespic.twitter.com/5r6d6dfj4R
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.