Don't care what it's used for there, as long as adversary has multiple control links in (probably multiple operators). Static thinking again. A few lines of code and dev will deploy other use in 15 minutes. Analysis needs to wait for control neutralization/isolation.
-
-
Because this *is* my field, I've pentested SoCs and embedded devices, I know where you can hide things and where you can't, I know how Flash memory buses work, I have the tools and I know how to use them. And *you* clearly don't.
-
APTs may be "A" but they aren't magic. If the pwnage is ephemeral, it *goes away after a power cycle and then your machine is clean*. If it's persistent, *you dump Flash and it's there*. There's no magic third option.
- Show replies
New conversation -
-
-
I guess they should be scared of you then. :-) That sounded like a challenge :-). These folks like challenges.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.