Marcus Mengs

@mame82

creator of , P4wnP1 A.L.O.A. and LOGITacker

Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @mame82

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mame82

  1. Prikvačeni tweet
    2. velj

    Dear friends, followers, InfoSec enthusiasts, I AM OUT FOR A WHILE! I will take a break from all public work, as I need more time for my beloved ones. This will affect projects like P4wnP1, P4wnP1 ALOA, LOGITacker and BLExy, as well ass all pending invitations to conferences.

    Prikaži ovu nit
    Poništi
  2. prije 21 sat

    Just in case you don't know Rogan or Luca, just look up their research and talks. Rogan was one of the pioneers for USB HID based covert chanels (USaBUSe) and Luca modified/extended those ideas with great open source hardware projects (WHIDInjector, WHIDElite etc), as I did

    Prikaži ovu nit
    Poništi
  3. prije 21 sat

    Thank you for the overwhelming positive feedback on my decision to take a break. Keeping word, I started to transfer projects to (P4wnP1, LOGITacker, munifying). Thx so much Rogan for helping in this! Also thank you (of course he is involved, too)

    Prikaži ovu nit
    Poništi
  4. 2. velj

    Sorry for the 'ass' typo in the first tweet

    Prikaži ovu nit
    Poništi
  5. 2. velj

    I won't suspend my Twitter account, cause I use it as ONLY channel to reach out to some people which became important to me (not only in technical terms). But I'm going to be very picky with answers to DMs in near future. Thank you for your understanding! 🍻👍

    Prikaži ovu nit
    Poništi
  6. 2. velj

    Thanks for following and supporting my work. There are already ongoing conversations according the transfer of aforementioned open source projects to new maintainers. Anyways, be sure to grab your copy of the already released ones, just in case.

    Prikaži ovu nit
    Poništi
  7. 2. velj

    Not talking about OSI model, when I say: After spotting a hole I fixed layer 1 and now move on to layer 2

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    to respond on all request about OLED etc on my usb key (by ) i have uploaded a ready to be burn image file (with OLED and UPS préconfigured) (16Gb MicroSD) plz watch readme file if you don't have UPS module cc

    Poništi
  9. 31. sij

    2/2 ... and here's the script:

    Prikaži ovu nit
    Poništi
  10. 31. sij

    After showing a tool which remotely enumerates&destroys an cable if connected to a blue team controlled WiFi (for Internet upstream), made a clear point that this is not how the cable should be deployed. So I ported the tool to NMAP scanner 1/2

    Prikaži ovu nit
    Poništi
  11. 29. sij

    wanna be prepared before asking you to attack me the next time (this gets a running gag)

    Prikaži ovu nit
    Poništi
  12. 29. sij

    Demo of a non-public tool which defeats cable, when connected to own coporate WiFi - extracts all keyboard payloads - extracts credentials used in AP mode (fallback) - triggers self-destruct 1st part: cable configuration in WebUI 2nd part: defeat

    Prikaži ovu nit
    Poništi
  13. 29. sij
    Prikaži ovu nit
    Poništi
  14. 29. sij

    Also I slightly changed my mind on the question "Does this have to be open sourced?" In this special case I'd say I wouldn't expect valuable contribution if the firmware gets OSS. But there would a risk of IP theft, for features implemented thanks to out-of-the-box thinking

    Prikaži ovu nit
    Poništi
  15. 29. sij

    Because of my deep respect of all the hard work put into this,I won't give details in the inner workings of the firmware, but be sure that one could feel passion and love which was put into this, even by reading the raw assembly code.

    Prikaži ovu nit
    Poništi
  16. 29. sij

    While waiting for a sample of "" cable, I decided to flash its firmware on another chip to have a look on the features. There's a very cool protection preventing this, which I bypassed using it as "Xtensa reversing training objective".

    Prikaži ovu nit
    Poništi
  17. 27. sij

    Do you remember the private key for the CA signed certs stored in Netgear routers? Just wanna say: I LOVE THE WORKAROUND!

    Poništi
  18. proslijedio/la je Tweet
    27. sij

    One day was bored, so he looked around his room - a few days later, he had reversed how his Playstation streamed audio to it's dualshock controller An epic walkthrough from idea to success.

    Poništi
  19. 25. sij

    The name "USBSamurai Pro" was a kind of insider joke. The cable consists of a Logitech receiver and an USB NanoHUB with total costs below $20. LOGITacker is used to control everything and runs on nrf52840 dongles for another $10

    Prikaži ovu nit
    Poništi
  20. 25. sij

    runs a remote shell on Win10 box, although it has no network connectivity. In addition the fake lock screen is used to extract user credentials through a covered wireless data channel

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·