Rezultati pretraživanja
  1. 16. velj 2019.

    First successful EMFI glitch on the stage

  2. 16. velj 2019.
  3. 28. ožu 2019.

    My slides "Attacking Hardware Root of Trust from UEFI Firmware" released. More details about bypass Boot Guard implementation on Lenovo Thinkpad's coming after and . Enjoy evil SMI handlers over WMI and stay tuned!

  4. 23. ožu 2019.

    All Computrace options Enable/Disable/Permanent Disable implemented fully in software over SMM drivers with LenovoSecuritySmiDispatcher orchestration (presented on ) Basically "Permanent Disable" option is a joke and can be reactivated any time. Stay tuned!

  5. 8. ožu 2019.

    Updated Analysis of PatchGuard on Windows 10 RS4 : following , my paper is out!

  6. 26. velj 2019.

    only few days after : firmware extract. (cc ), emulation, fuzzing->1st stack based BoF triggered and it will not be the last one I think (NX only) thx for the training :D

  7. 24. velj 2019.

    Following my presentation, I just released the paper on Windows Defender ASR bypass on my blog () and on GitHub. I will not release more code samples than what is in the paper, I don't want to help ransomware writers!

  8. 22. velj 2019.

    A bit late, but here are the slides from my talk “3D Accelerated Exploitation”. Thanks for letting me do this cool thing.

    Prikaži ovu nit
  9. 22. velj 2019.
  10. 21. velj 2019.

    I uploaded the slides I presented at on github. Paper coming soon!

  11. 17. velj 2019.

    Here are the slides from my talk about my approach for JavaScript engine fuzzing: My master's thesis (for which I developed the fuzzer) can be found here: Thanks for the great conference ! =)

    Prikaži ovu nit
  12. 17. velj 2019.

    Soo, , 10/10, would do again! :D I felt very welcome. The atmosphere was super friendly in general + the technical level was very impressive. Many reached out, esp. the Organizers, but also attendees. I got included in conversations or offered a helping hand.

    Prikaži ovu nit
  13. 16. velj 2019.

    Thank you everyone who supported us in this wonderful edition. We will be sending feedback forms over email in the coming weeks. Please take some time to fill them out.

  14. summary: honor of shaking hands with , research idea from , very 1st shell on a real world device thanks to , this all with my who also helped me with the dinner! Thanks to !

  15. 16. velj 2019.
  16. 15. velj 2019.

    I've survived the Linux kernel exploit training by at I've never been so happy to pop a shell :D Highly recommended!

  17. 15. velj 2019.

    Just a bunch of 0days in the Linux USB subsystem.

  18. Great to be at and presenting "Bugs So Nice They Patched Them Twice." Great crowd and some great conversations.

  19. 15. velj 2019.

    is amazing as usual. Great atmosphere, great talks, excellent people around. Thanks Miguel and Lukas for being such a great hosters

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.