Rick

@rickyhousley

Reverse Engineer and Hardware Hacker 😾😾😾 & BADFET

United States
Vrijeme pridruživanja: studeni 2012.

Tweetovi

Blokirali ste korisnika/cu @rickyhousley

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rickyhousley

  1. proslijedio/la je Tweet
    11. stu 2019.
    Poništi
  2. proslijedio/la je Tweet
    7. stu 2019.

    Something cool but we can't say what it is yet! by and

    Poništi
  3. proslijedio/la je Tweet
    23. ruj 2019.

    Excited to finally release our preliminary talk schedule for ! We'll be highlighting talks and activities over the next week, stay tuned!

    Poništi
  4. proslijedio/la je Tweet

    My article looking at urban street network orientation, connectivity, spatial configuration, and entropy is now published! Blog summary and link to paper: Here's how the streets orient in 100 cities around the world (THREAD):

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    1. ruj 2019.

    The Disclosure about Esp32 security continues. This time, it's a secure boot bypass using voltage glitching: No way to fix it except hardware revision🥶. Stay tuned for the final act.

    Poništi
  6. 14. kol 2019.

    Throwing a question into the void - anyone have a good suggestion for parsing a structured text file format? Was trying EBNF grammar + puthon’s Lark package, but it’s slow with a 80,000+ line file. Looking for the “right” approach.

    Poništi
  7. proslijedio/la je Tweet
    13. kol 2019.
    Odgovor korisniku/ci

    No PE or DWARF but here's a prime that is an ELF file :) 0x7f454c46010101000000000000000000020003000100000054800408340000000000000000000000340020000100000000000000010000000000000000800408008004085b0000005b0000000500000000100000b32a31c040cd80597ec9b11d

    Poništi
  8. proslijedio/la je Tweet
    8. kol 2019.
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    8. kol 2019.

    checkout our repo to learn about our talk "100 Seconds of Solitude:Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans!

    Poništi
  10. proslijedio/la je Tweet
    8. kol 2019.

    It was amazing that and were nominated for a Black Hat Pwnie Award for Epic Achievement. For a more technical audience, makes the elegant argument that Psychedelic Warlord should also have been nominated for Best Privilege Escalation Bug.

    Poništi
  11. 22. srp 2019.

    Anyone know of a ProAsic3 dev board that does not cost a fortune?

    Poništi
  12. proslijedio/la je Tweet
    13. svi 2019.

    This is a beauty vuln and Cisco is in a challenging situation. Turns out Trust Anchor hardware security in big-end routers is done on... an FPGA... perhaps one that can’t support an encrypted bitstream. Ouch. Nasty vuln. Crypto material access. Awesome persistence location.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    Expired: Using CVEs for vulnerabilities Tired: Using puns for vulnerabilities, eg HEARTBLEED Wired: Using emojis for vulnerabilities, eg 😾😾😾, the latest privilege-escalation hole in Cisco gear

    Poništi
  14. proslijedio/la je Tweet

    researchers have developed a method to defeat Cisco's Trust Anchor...and it has bonus bad implications for FPGAs (a whole class of reprogrammable chip)

    Poništi
  15. 13. svi 2019.

    If you have been wondering what I’ve been up to (besides switching jobs), check out and I’s recent security disclosure involving fpga reverse engineering and bitstream manipulation!

    Poništi
  16. 17. stu 2017.
    Poništi
  17. proslijedio/la je Tweet
    7. stu 2017.

    Red Balloon Security is running a CTF for . This is the grand prize*! *Flame thrower and broomstick not included.

    Poništi
  18. proslijedio/la je Tweet
    6. stu 2017.
    Poništi
  19. 15. kol 2017.

    Our BADFET Electromagnetic Fault Injection WOOT paper is finally available!

    Poništi
  20. proslijedio/la je Tweet
    19. srp 2017.

    OK, this Red Balloon challenge is seriously cool! Get a Hard Drive to reverse Bitcoin from (firmware) Saturday by the pool.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·