Vlad Ionescu

@ucsenoi

Red Team @ FB 👀 Alumn @ NCC Group, Mandiant Red Team, Palantir 👻 Likes RF and deniable infra

Oregon
Vrijeme pridruživanja: srpanj 2009.

Tweetovi

Blokirali ste korisnika/cu @ucsenoi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ucsenoi

  1. 2. velj

    Anyway this is how you soften epoxy potting enough to be able to tear it off the PCB and get at the chips underneath. Boil the potted device for 10 minutes. Glass prevents the device from resting on the bottom and burning! I'm sure there's a fancier way to do this.

    Poništi
  2. 31. sij

    This is a superbly written zero-to-one on what to do when you have an embedded platform in your hands. Bonus points for Ghidra!

    Poništi
  3. 31. sij

    This tweet brought to you by the nerd rage that only $40/device inflight wifi can make. I'm expensing it but that's not the point. It's the principle of the thing. And yes I know how much satellite internet costs that's a GATR in my avi. s/o to GL-AR750 + MAC spoof + WireGuard

    Poništi
  4. 28. sij

    Everyone: omg I love to cook 👨‍🍳🥘 Me:

    Poništi
  5. 27. sij
    Poništi
  6. 25. sij

    Worms Armageddon (and many other DOS games I've since forgotten) are to thank for my exposure to the hacking scene.

    Prikaži ovu nit
    Poništi
  7. 25. sij

    Growing up in Romania we couldn't buy video games legally (even if we had the money, which, lol) but we had excellent internet everywhere. So naturally warez FTPs were popular. I learned how to computer out of necessity, to get and play cracked games.

    Prikaži ovu nit
    Poništi
  8. 25. sij

    the internet is full of shit and I don't have a big enough shovel

    Poništi
  9. 22. sij

    I called my ISP in a huff that the internet was down. They had a tech at my door within a few hours...who installed an attenuator and got me back online. Turns out my signal was too good!?

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Earlier today we published the details of a set of vulnerabilities in Safari's Intelligent Tracking Prevention privacy mechanism: . They are... interesting. [1/9]

    Prikaži ovu nit
    Poništi
  11. 22. sij

    Awesome CFP platform, despite the hilarious troll.

    Prikaži ovu nit
    Poništi
  12. 22. sij

    Sent out a slew of emails, only to see after the fact that templating/placeholders are not yet supported but for some reason are still in the included email templates?!? WHY ?

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    22. sij

    I just published a ~45 page whitepaper on attacking and defending terraform infrastructure as code in GitHub. Includes attack scenarios, hardening, detections, etc. Deep thanks to and for their inspiration and research. ❤️ 1/3

    Prikaži ovu nit
    Poništi
  14. 14. sij

    Recent paper on tricky crypto bugs in signature systems, including similarities to today's CVE. Will read this weekend, thanks for sharing (and writing) it Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures

    Poništi
  15. proslijedio/la je Tweet
    14. sij
    Poništi
  16. proslijedio/la je Tweet
    13. sij

    Pentest your prevention controls Unit test your detection controls Red Team your response processes ☝️Mixing the above comes with diminished results.

    Prikaži ovu nit
    Poništi
  17. 13. sij

    If you see me looking bored typing on a ThinkPad with a privacy screen on, be concerned.

    Prikaži ovu nit
    Poništi
  18. 13. sij

    I have many thoughts on stickers/wearing logos/OPSEC but I'll leave it at this: my regular laptops are stickered to the max, my red team laptops are as boring as possible

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    Once after a bad hookup at my apartment with someone I absolutely never want to see again, I wrote some hacky software where if someone with a specific MAC address connects to my WiFi, the lights in my apartment will flash red. Probably overkill, but the hookup was that bad.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·