nSinus-R

@nSinusR

Captures flags with . Postdoc at and maintainer of avatar2.

Vrijeme pridruživanja: kolovoz 2011.

Tweetovi

Blokirali ste korisnika/cu @nSinusR

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @nSinusR

  1. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima

    Yeah, some code from Avatar2 helped make this possible thanks to a recent merge! The linked example is an ugly prototype- I’m hoping to have a better interface and support for other architectures very soon.

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    Added a new interface to PANDA today which mostly recreates Unicorn Engine but with support for taint analysis (and all the other existing PANDA features). Might be time for a series of blog posts about using PANDA from python.

    Prikaži ovu nit
    Poništi
  3. 28. sij

    Big news in avatar2 land: v1.3.1 was just released. Among others, we now support QEMU v4.2.0, and our modifications to PANDA have been mainlined, deprecating the need of a separate avatar-panda. Thanks to everyone involved!

    Poništi
  4. proslijedio/la je Tweet
    16. sij

    Dear reviewers: before claiming "X has already been done by Y earlier this year", check if your deadline might have been before this "earlier" date the research has been published. We couldn't possibly know. Thanks.

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    Zelda OOT speedruns in 2020: "yeah we just manipulate the heap by lifting rocks to exploit a use-after-free and rewrite a function pointer to jump into a multi stage payload involving Link's name and the buttons pressed on controllers 1 and 3"

    Poništi
  6. proslijedio/la je Tweet
    27. pro 2019.

    Come by the Hardware Slacking assembly at and get valuable voltage glitching experience without the hard work! We'll also be running some slightly more serious mini-workshops. We finally pushed the source for our terrible (but super fun) glitcher to

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    26. pro 2019.

    Come to the panel "I am a kernel dev - Ask me anything!" tomorrow Dec 27th, 19:00–19:45, at nokingdome!:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    26. pro 2019.

    Congratulations to badfirmware and Maple Bacon! Don't forget to fill in the survey on !! The score we get there helps us a lot for next time :D

    Poništi
  9. proslijedio/la je Tweet
    25. pro 2019.

    My x-mas gift to you: The last Pwny Racing episode of the year will air on Saturday 14:00 UTC live from Set a reminder: and watch the action as and I guide you while our participants: , , and compete!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    21. pro 2019.

    We'll have a Hardware Slackers assembly at . Breaking hardware with fault injection⚡️ or side channels📈 is easy and fun, drop by and try it! We'll also be doing other random hardware (security) stuff, playing with avatar2 and hopefully hacking Trådfri💡 thanks to .

    Poništi
  11. 17. pro 2019.

    And with that challenge for , I pushed enough challs based on OP-TEE. For next year, expect different things. :P

    Prikaži ovu nit
    Poništi
  12. 17. pro 2019.

    Amazing write-up for another OP-TEE chall of mine. However, option 2 works also without the secure-uart, you would get the output of the abort-handler also if only one uart is defined. (At least for the setup of this chall.) Still, excellent job and beautiful usage of

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    14. pro 2019.

    Very nice CTF ! Interesting challs, first time I see a real RISC-V board et very good op-tee challs, thanks a lot ! See you next year

    Poništi
  14. proslijedio/la je Tweet
    29. stu 2019.

    Been hyped up for our HALucinator paper? Wait no more, we got you! The paper is now available, fresh from the press: As always, comments are very welcome! This was a collaboration between , , and

    Poništi
  15. 29. stu 2019.

    This. Also, if someone wants to add new target devices avatar2, please reach out to me. I'm more than happy to give pointers on how to improve the framework. Lastly, here is a link to its sorce: :)

    Poništi
  16. proslijedio/la je Tweet
    28. stu 2019.

    ph0wn c'est bientôt. Le vendredi TREIZE décembre. C'est fait exprès. Ca vous portera chance ?

    Poništi
  17. proslijedio/la je Tweet
    26. stu 2019.

    In principle if you have JTAG you can get record/replay by running the firmware in something like QEMU and forwarding MMIO to the real hardware (e.g. ) ; combine that with record/replay from something like PANDA and you're halfway there.

    Poništi
  18. proslijedio/la je Tweet
    18. stu 2019.

    BAP 2.0 is finally out! We have a Knowledge Base that now drives all our analyses as well as a new extensible representation of program semantics, with full support for IEEE754 and not only. Visit or for more information! -

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    30. lis 2019.

    pushed my versions-as-a-service challenge (extract from a binary with delve, ROP via arbitrary write_at to /proc/self/mem):

    Poništi
  20. 29. lis 2019.

    I just pushed sources and exploits for my tee-challenges! If you are interested in an exploitation challenge based on the Open Portable Trusted Execution Environment (OP-TEE), go check it out: :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·