|
Maxim Goryachy
@
h0t_max
Moscow, Russia
|
|
Hardware/Software/Firmware/IntelME Researcher.
Opinions are my own and not the views of my employer.
|
|
|
556
Tweetovi
|
223
Pratim
|
3.549
Osobe koje vas prate
|
| Tweetovi |
| Maxim Goryachy proslijedio/la je tweet | ||
|
Neuron Hackspace
@neuronspace
|
27. sij |
|
[Мастер-класс] DMA-атаки на практике. Эксплоит через прямой доступ к памяти. Практическое занятие по эксплуатации уязвимостей низкоуровневого доступа к оперативной памяти (Direct Memory Access). Дата: суббота 1 февраля 2020 neuronspace.timepad.ru/event/1244246/ pic.twitter.com/0dgCUA9lwg
|
||
|
|
||
|
Maxim Goryachy
@h0t_max
|
24. sij |
|
Купите жидкого азота;)
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
Mark Ermolov
@_markel___
|
22. sij |
|
We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (intel.com/content/www/us…). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
Boris Larin
@oct0xor
|
21. sij |
|
Hacking Sony PlayStation Blu-ray Drives #36c3 [SLIDES] github.com/oct0xor/presen… pic.twitter.com/nM0HklOyAO
|
||
|
|
||
|
Maxim Goryachy
@h0t_max
|
20. sij |
|
Please re-read again
|
||
|
|
||
|
Maxim Goryachy
@h0t_max
|
20. sij |
|
I talked about market platform, you comment looks like "this is not our problem" for me. I believe that the sign of good work should not be considered a feature implementation, but how often it is used by customers.
|
||
|
|
||
|
Maxim Goryachy
@h0t_max
|
20. sij |
|
so re-read my first tweet
|
||
|
|
||
|
Maxim Goryachy
@h0t_max
|
20. sij |
|
Could you tell me please some market computer with such protection?
|
||
|
|
||
|
Maxim Goryachy
@h0t_max
|
20. sij |
|
Let me remind that there is still no protection against during the version downgrade on client platforms...
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
Mark Ermolov
@_markel___
|
20. sij |
|
Intel Cannon Point chipset (300 series) as well as Apollo Lake and Gemini Lake SoCs have very dangerous Delayed Authentication Mode (DAM) vulnerability allowing arbitrary code execution and the root key prediction. Detailed write-up is coming. Stay tuned.
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
Project Zero Bugs
@ProjectZeroBugs
|
9. sij |
|
Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass googleprojectzero.blogspot.com/2020/01/remote…
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
IACR
@IACR_News
|
7. sij |
|
#ePrint SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust: G Leurent, T Peyrin ia.cr/2020/014
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
Daniel Gruss
@lavados
|
10. pro |
|
Embargo ends - #PlunderVolt is public: plundervolt.com
It allows to induce faults into computations in SGX, breaking crypto and corrupting memory.
youtube.com/watch?v=In3B9L…
Great collaboration with Kit Murdock, @sublevado, @halfdoof, @jovanbulck, Frank Piessens!!
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
Ulf Frisk
@UlfFrisk
|
3. pro |
|
MemProcFS v3.0 finally released 🔥 Super fast memory analysis in convenient file system or C/Python API.
Now support Threads, Handles, VADs! Completely rewritten memory core -> way better memory&file recovery rates 😀
github.com/ufrisk/MemProc… pic.twitter.com/2w9boyJTme
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
Mark Ermolov
@_markel___
|
23. stu |
|
This very pictorial scheme proves a link between IOSF Side Band segments of CPU complex and PCH in modern platforms (Cannon Lake, Ice Lake). So, the question is whether now Intel CSME has an access to MEE of Intel SGX which is certainly connected to IOSF SB pic.twitter.com/fFUSKlK0lO
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
Project Zero Bugs
@ProjectZeroBugs
|
21. stu |
|
Bad Binder: Android In-The-Wild Exploit googleprojectzero.blogspot.com/2019/11/bad-bi…
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
OFFZONE
@offzone_moscow
|
23. lis |
|
OFFZONE 2020 — April 16-17, Moscow, Russia. Save the date! 🗓
📝Call for Papers is now officially open — get your talk proposals submitted 📜👉🏻cfp.offzone.moscow/y2020/
Make sure to check out Speaker Benefits and CFP Principles ➡️ offzone.moscow/2020-call-for-…
See you at OFFZONE 2020! pic.twitter.com/71saIMZwG2
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
🥝 Benjamin Delpy
@gentilkiwi
|
13. stu |
|
Happy to see more usages of Credential Guard protection in Windows 10 (enterprise/business), with persistance across reboots. #mimikatz
* BCryptIsoKeyData for CNG private keys ;
* Credential for domain_password credentials ;
* LsaIsoAsymmetricKeyBlob for MachineBoundCertificate. pic.twitter.com/XuCKaUGz7S
|
||
|
|
||
| Maxim Goryachy proslijedio/la je tweet | ||
|
Mark Ermolov
@_markel___
|
12. stu |
|
Intel discloses remote 'privileges escalation' vulnerability in CSME for non-vPro systems (not having AMT module). That's a precedent breaking well recognized assumptions about remote attacks on CSME (CVE-2019-0169): intel.com/content/www/us…
|
||
|
|
||
|
Maxim Goryachy
@h0t_max
|
12. stu |
|
Perfect keynote "Hardware Security is Hard: How Hardware Boundaries Define Platform Security" by @matrosov on @ZeroNights 2019 pic.twitter.com/ME1OZWXDbr
|
||
|
|
||