Slawomir Jasek

@slawekja

Training on picking smart locks at ; heading research & securing soft ; author of BLE MITM proxy GATTacker

Vrijeme pridruživanja: travanj 2015.

Tweetovi

Blokirali ste korisnika/cu @slawekja

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @slawekja

  1. 13. pro 2019.

    My "smart lock picking" training helped with research of smart lock - which "encrypts" using key derived from public MAC 😱 Want to learn , and more? Sign up for the next session

    Poništi
  2. 17. lis 2019.

    Sneak peek preview: prototype of upcoming Quince that will soon shake the open source industry - covering all the channels at the same time with inexpensive hardware and a single antenna

    Poništi
  3. 17. lis 2019.

    Testing remote relay, CDCVM floor limit bypass and cryptogram preplay attacks live on my and HCE contactless payments with and here at

    Poništi
  4. 12. lis 2019.

    My biggest training about to start at the biggest in . 4 days, 2400+ pages of materials, the largest hardware pack included. Can't wait to meet you all!

    Poništi
  5. 27. ruj 2019.

    Sorry, misspelled Sultan's name: Qasim not Khasim.

    Prikaži ovu nit
    Poništi
  6. 27. ruj 2019.

    The new open source 5 sniffer "Sniffle" just presented by Sultan Khasim Khan works very well. Captures my LE connections every time (all adv channels using single radio) unlike other sniffers

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    Odgovor korisnicima i sljedećem broju korisnika:

    Interesting attack! Fortunately this was resolved in the SoftDevice in 2016 (and only affected nRF51)

    Poništi
  8. 11. kol 2019.

    An unauthenticated attacker in BLE range may be able to remotely fully compromise devices based on nRF SoC and softdevice (default), running as BLE central (connecting to other devices). E.g. IoT cloud-wifi-ble bridges, remote controllers, wireless fobs... Similar to

    Prikaži ovu nit
    Poništi
  9. 11. kol 2019.

    The nRF softdevice vulnerability just presented by may have serious impact not only on the sex toys but also remotes, smart lock key fobs, hubs, bridges and routers. Any advisory, patch from ?

    Prikaži ovu nit
    Poništi
  10. 25. lip 2019.

    Slides from my "Cracking Mifare Classic on the cheap" and "A 45min introduction to Low Energy" are here: Thanks to the wonderful audience for attending so numerously, and for having me!

    Poništi
  11. proslijedio/la je Tweet
    22. lip 2019.

    I don't always have my Promark3 with me, especially during the weekend. But if you cross , you can get a very some useful visit cards! And that fits in your wallet :)

    Poništi
  12. 19. lip 2019.

    You can break into the Digitally Protected IoT Mansion here at by cloning Barbie's door key in 2s - using just a phone and my "magic NFC" business card! Come try it yourself, it's fun! Catch me up to get the card

    Poništi
  13. 19. lip 2019.

    Everything set for my and . Come, get my "magic NFC" business card, hack smart locks, access control system and hotel in just 45min sessions. More info, multiple editions schedule

    Poništi
  14. proslijedio/la je Tweet
    17. lip 2019.

    just hacking some smart dildos and other hardware as you would

    Poništi
  15. 6. lip 2019.

    The recording of the talk is already online! HQ (1.4G): LQ (70M, good enough) It is in French, but the slides are easy to follow, and live demos speak for themselves.

    Prikaži ovu nit
    Poništi
  16. 6. lip 2019.

    The new tool "MIRAGE" presented today looks really promising. Combines several attacks into a single, nice python interface. Grab it as it is still hot:

    Prikaži ovu nit
    Poništi
  17. 4. lip 2019.

    Very nice talk and live demos of attacks on wireless HID devices by and at . Hope to help with further research with new keyboards, I already coded custom one with arbitrary LTK key for spoofing.

    Poništi
  18. 3. lip 2019.

    With my "magic NFC" business card you can clone your hotel key in 2s using just Android phone . Catch me up to get one! Also, try it yourself at our live access control installation booth in the main hall!

    Poništi
  19. 30. svi 2019.

    Thanks, Jilles! I hope to update these workshop materials soon by the way.

    Tweet je nedostupan.
    Poništi
  20. 17. svi 2019.

    OK, so thanks to the help of someone who prefers to stay anonymous, we have confirmed my observations also on Feitian v3. I still don't believe it until I have a working PoC exploit, so going back to work on this...

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·