Cristofaro Mune

@pulsoid

Product Security Consultant & Research. In between HW & SW. Fault Injection, TEEs, System Sec, IoT & anything else challenging my curiosity. No bullshit policy.

Science.Art.Life
Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @pulsoid

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pulsoid

  1. Prikvačeni tweet
    5. pro 2019.

    Excited to share that my "TEE Offensive Core" training will be featured at in August 2020! Humbled to be part of such an amazing lineup. See you in !

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    If you watch European hacker con videos, then you've probably seen some of 's work. If you've got a spare few quid, chip in on his campaign and help him cover the cost of all this work he does for free.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Please have another peek into the kitchen! This exercise uses fault injection which is commonly used to bypass Secure Boot when software vulnerabilities are unknown. Join us at to experience many more ways to bypass Secure Boot!

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Everyone's investing in EDR sofware, next-gen firewalls & pentests. But larger transactions, private cloud etc. are run by The Mainframe! Davide Girardi & Erik Wilhelmsson will take you through a live demo of a mainframe takeover. Read more

    Poništi
  5. 31. sij

    If you're approaching TZ OSes like a normal OS, you may be missing part of the fun... "TEE Offensive Core" only covers TEE- specific vulns and techniques. e.g. using system HW for SW exploitation. If interested, join me at . Likely, the only US session in 2020.

    Poništi
  6. 27. sij

    "Use After Flame"? 🤨

    Poništi
  7. proslijedio/la je Tweet
    25. sij

    See you in Miami! This year I’ll talk about how to get from zero to zeroday. Not much information on how to become a vulnerability researcher out there, let’s change that!

    Poništi
  8. proslijedio/la je Tweet
    24. sij

    New to fault injection attacks? presents fault injection fundamentals, myths, and misconceptions. Then master based exploitation with at Secure your Early Bird ticket 😎

    Poništi
  9. 24. sij

    A shout-out to here! Always great to dig up new angles and share research together. :)

    Poništi
  10. proslijedio/la je Tweet
    16. sij

    Whoever fights monsters should see to it that in the process he does not become a monster. And if you gaze long enough into an abyss, the abyss will gaze back into you. WarCon V (Pentagram Edition) scheduled for 29 & 30th May 2020 \m/

    Poništi
  11. proslijedio/la je Tweet
    20. sij

    Do you want uncoordinated disclosure? Because if your bug bounty program bans publication, you're setting a price on people's willingness to stay quiet. If they disagree with that price or that principle and you don't have an alternative path, you'll get uncoordinated disclosure.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    20. sij

    Dear , Putting the private key for a CA blessed certificate in firmware is a bad idea. and I found a couple a couple terrible things.

    Poništi
  13. 20. sij

    Found some time during XMas holidays to complete 2. No time for report, but always a fun opportunity to refresh some skills I rarely use. 2nd year, 100% (s) completion (+ 2015) & photos with Santa! Thanks & team for the great fun!

    Poništi
  14. 18. sij

    Indeed. Fully agree with my friend The first time I can also recall the use of a "type confusion" technique is in the context of JavaCard exploitation.

    Poništi
  15. proslijedio/la je Tweet

    Did the 1st venue recce at the new for Goa 2020 . Amazing venue, feeling excited ! See you all in March !

    Poništi
  16. proslijedio/la je Tweet
    15. sij

    It's time to release Raiden. We are proud to announce that it will be released during Black Hat Asia event. More details below, and hope see you there

    Poništi
  17. proslijedio/la je Tweet
    16. sij

    The recording of our (with ) fault injection on Secure Boot talk showing a fault simulator and glitching an Android device live on stage at EU '18 got published! Now is your chance to watch it back it if you weren't there!

    Poništi
  18. proslijedio/la je Tweet
    8. sij
    Poništi
  19. proslijedio/la je Tweet
    7. sij

    Debunking Fault Injection Myths And Misconceptions - Cristofaro Mune and Niek Timmers

    Poništi
  20. proslijedio/la je Tweet
    6. sij

    Niek Timmers () & Cristofaro Mune () will conduct a 3-days hands-on training on "BootPwn - Pwning Secure Boot by Experience" at . Get hands dirty breaking Secure Boot with attacks beyond software exploitation.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·