Federico Maggi

@phretor

Researcher . Tweets are my own, because they come from the bottom of my ♥️

Vrijeme pridruživanja: veljača 2008.

Tweetovi

Blokirali ste korisnika/cu @phretor

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @phretor

  1. Prikvačeni tweet
    21. sij

    🚨 [paper release] we ran a real behind a “real” factory 🏭 for 6 months: here’s how we did it and what we’ve recorded. Cc:

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Threat actors can set up a code to prevent the real owner of a digital multimeter from changing important configurations. Learn about securing measurement instruments:

    Poništi
  4. 29. sij

    Interesting piece on why security industry must improve ties with academia

    Poništi
  5. 25. sij
    Poništi
  6. proslijedio/la je Tweet
    22. sij

    For those who attended our talk with at , I will push the client utility for Siemens S7 bootloader arbitrary code execution here:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    21. sij

    . presenting new Factory Honeypot Research at . “Stickiest” honeypot ever!

    Poništi
  8. proslijedio/la je Tweet
    16. sij

    We happily announce our first talk « Identifying multi-binary vulnerabilities in embedded firmware at scale » from et al.

    Poništi
  9. 12. sij

    Leo si è nascosto in camera sua ad ascoltare “I want to break free” con in bocca il ciuccio di quando era piccolo. Trasgressione massima.

    Poništi
  10. 9. sij
    Poništi
  11. 6. sij

    Si potrebbe farne un fumetto illustrato stile ma ambientato in Italia. Un freddo e amaro resoconto della verità.

    Poništi
  12. 25. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    21. pro 2019.

    If you think a conference is only valuable for its talks, I suggest you reconsider where you invest your money in. A YouTube premium account is way cheaper, and there’s plenty of talks there!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    17. pro 2019.

    I am glad to announce that we released the source code of KARONTE at . Our tool tracks information data-flow across the different components of a firmware and finds vulnerabilities. Our paper can be found at

    Poništi
  15. proslijedio/la je Tweet
    12. pro 2019.

    open-source Wi-Fi baseband chip/FPGA design, openwifi is online: . full stack real time SDR (Software Defined Radio) Wi-Fi implementation on FPGA with embedded ARM Linux. compatible with Linux mac80211 SoftMAC framework. Christmas present to research!

    Poništi
  16. 12. pro 2019.

    Want to take a closer look at how targets oil & gas companies? ⛽️ Here's a good research by colleagues Feike and Cedric from Trend Micro

    Poništi
  17. proslijedio/la je Tweet
    11. pro 2019.

    We opened the CfP for with deadline on March 31st. Proposals sent before February 29th will receive early notification.

    Poništi
  18. 9. pro 2019.
    Poništi
  19. 9. pro 2019.

    When you think you’ve done a good job on your latest PCB design, check this out 😲😲😱

    Poništi
  20. 5. pro 2019.

    Flying back home after an amazing 2-days at - as usual, the best part of conferences for me is talking to old and new friends. See you all around!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·