Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @slawekja
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @slawekja
-
My "smart lock picking" training helped
@FSecureLabs@__0kami with research of smart lock - which "encrypts"#BLE using key derived from public MAC
Want to learn #hacking#Bluetooth,#NFC and more? Sign up for the next session@HITBSecConf#HITB2020AMS https://smartlockpicking.com/events/hackinthebox_amsterdam_2020/ …https://twitter.com/FSecure_Consult/status/1204703673521188867 …
0:43Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sneak peek preview: prototype of
@michaelossmann upcoming Quince that will soon shake the open source#Bluetooth#sniffing industry - covering all the channels at the same time with inexpensive hardware and a single antenna#HITBCyberWeekpic.twitter.com/CmSa8nwDkQ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Testing
#EMV remote relay, CDCVM floor limit bypass and cryptogram preplay attacks live on my#visa and#mastercard HCE contactless payments with@L_AGalloway and@a66ot here at#HITBCyberWeekpic.twitter.com/a3rUIotw2V
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
My biggest
#BLE#NFC#RFID#HCE#EMV#SDR training about to start at the biggest#HITBCyberweek#HITB#hackinthebox in#AbuDhabi. 4 days, 2400+ pages of materials, the largest hardware pack included. Can't wait to meet you all!#itsgoingtobeawesomepic.twitter.com/j4cryp4ec4
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sorry, misspelled Sultan's name: Qasim not Khasim.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The new open source
#BLE#Bluetooth 5 sniffer "Sniffle" just presented by@NCCsecurityUS Sultan Khasim Khan@hardwear_io works very well. Captures my LE connections every time (all adv channels using single radio) unlike other sniffers https://github.com/nccgroup/sniffle/ …#hw_io#hardwear_iohttps://twitter.com/hardwear_io/status/1177568937711734785 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Slawomir Jasek proslijedio/la je Tweet
Interesting attack! Fortunately this was resolved in the SoftDevice in 2016 (and only affected nRF51) https://infocenter.nordicsemi.com/pdf/in_119_v1.0.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
An unauthenticated attacker in BLE range may be able to remotely fully compromise devices based on nRF SoC and softdevice (default), running as BLE central (connecting to other devices). E.g. IoT cloud-wifi-ble bridges, remote controllers, wireless fobs... Similar to
#bleedingbitPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The nRF softdevice
#security vulnerability just presented by@smealum@defcon may have serious impact not only on the sex toys but also#BLE remotes, smart lock key fobs, hubs, bridges and routers. Any advisory, patch from@NordicTweets?#Defcon#DEFCON27 https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-smea-Adventures-in-smart-buttplug-penetration-testing.pdf …pic.twitter.com/QRBKtxsyUQ
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Slides from my
#HIP19#NFC "Cracking Mifare Classic on the cheap" and#BLE "A 45min introduction to#Bluetooth Low Energy"#security#hacking#workshops are here: https://smartlockpicking.com/events/hip19_workshops/#slides … Thanks to the wonderful audience for attending so numerously, and@hackinparis for having me!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Slawomir Jasek proslijedio/la je Tweet
I don't always have my Promark3 with me, especially during the weekend. But if you cross
@slawekja, you can get a very some useful visit cards! And that fits in your wallet :)pic.twitter.com/xK8vYY2lC2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
You can break into the
@sysdream Digitally Protected IoT Mansion here at#HIP19 by cloning Barbie's#NFC door key in 2s - using just a phone and my "magic NFC" business card! Come try it yourself, it's fun! Catch me up@hackinparis to get the card http://smartlockpicking.com/card pic.twitter.com/4HbxHSPtEDHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Everything set for my
#HIP19@hackinparis#NFC and#BLE#hacking#workshops. Come, get my "magic NFC" business card, hack smart locks, access control system and hotel in just 45min sessions. More info, multiple editions schedule https://smartlockpicking.com/hip19 pic.twitter.com/BqU1JGvPUg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Slawomir Jasek proslijedio/la je Tweet
just hacking some smart dildos and other hardware as you would
#HIP19@hackinparispic.twitter.com/jleCut7tpP
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The recording of the talk is already online! HQ (1.4G): https://static.sstic.org/videos2019/1080p/SSTIC_2019-06-06_P03.mp4 … LQ (70M, good enough) https://static.sstic.org/videos2019/540p/SSTIC_2019-06-06_P03.mp4 … It is in French, but the slides are easy to follow, and live demos speak for themselves.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The new
#BLE#security tool "MIRAGE" presented today@sstic looks really promising. Combines several attacks into a single, nice python interface. Grab it as it is still hot: http://homepages.laas.fr/rcayre/mirage-documentation/ … https://twitter.com/doegox/status/1136549858616238080 …pic.twitter.com/l2w3dzNRLy
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Very nice talk and live demos of attacks on wireless HID devices by
@matthiasdeeg and@iiiikarus at@CONFidenceConf#CONFidence_conference. Hope to help with further research with new#BLE keyboards, I already coded custom one with arbitrary LTK key for spoofing.pic.twitter.com/3UWMH8hYUX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
With my "magic NFC" business card you can clone your
#CONFidenceConf hotel key in 2s using just Android phone https://smartlockpicking.com/card . Catch me up@CONFidenceConf to get one! Also, try it yourself at our live access control installation@SecuRingPL booth in the main hall!https://twitter.com/iiiikarus/status/1135678171280478208 …
0:09Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thanks, Jilles! I hope to update these workshop materials soon by the way. https://twitter.com/jilles_com/status/1134016264404459521 …
Tweet je nedostupan.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
OK, so thanks to the help of someone who prefers to stay anonymous, we have confirmed my observations also on Feitian v3. I still don't believe it until I have a working PoC exploit, so going back to work on this...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
Read
So much for "403 - Forbidden"