Twitter | Pretraživanje | |
Alex Matrosov
IDAholic, , , "Rootkits and Bootkits" book co-author (), BIOS voodoo, and TEE exorcist. Chief Offensive REsearcher at
5.836
Tweetovi
1.345
Pratim
12.900
Osobe koje vas prate
Tweetovi
Alex Matrosov proslijedio/la je tweet
Dave dwizzzle Weston 6 h
Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Casey Smith 22 h
Custom Signed Kernel Driver's Pretty cool 😃 Without the need to enable TestSigning. Sample Project:
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Black Hat 3. velj
Announcement: The Black Hat USA Call for Papers is now open! Submit your proposal for the chance to present your research at the premier security conference in Vegas. View the submission requirements and apply here:
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Andrey Konovalov 29. sij
Implemented a PoC for disabling kernel lockdown on Ubuntu via a keyboard emulated through USB/IP, CC
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Brian Richardson 3. velj
Video from my presentation is now available. "Capsule Update & LVFS: Improving system firmware updates"
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Aleksei 2. velj
I am starting a blog. First post is about the StarkWare Hash Challenge
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Yarden Shafir 2. velj
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Daniel Maslowski 1. velj
I am quite exhausted from the sheer complexity of the research I have been doing, having just spoken about the ME at . Now it's your turn: Please look into it as well and post your follow-up insights! ✨👩🏻‍💻 Slides: Video will follow.
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
FireF0X 2. velj
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Kraken Exchange 31. sij
🚨It took Kraken Security Labs just 15 minutes to hack both of ’s crypto hardware wallets. Here’s how we did it and what it means if you’re a user:
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Kostya Serebryany 30. sij
HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
James Forshaw 30. sij
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
j00ru//vx 30. sij
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Real World Crypto 28. sij
Many of the slide-decks from Real World Crypto 2020 are now available online via: Videos at: Feedback survey at:
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov 28. sij
Odgovor korisniku/ci @hughsient
unfortunately I don’t know good resource with an explanation of badness to having active uefi shell. But it’s definitely create additional supply chain security risk. Downgrade microcode, abuse update process or attack SMI handlers will be much easier (ThinkPwn). Many other stuff
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov 27. sij
Odgovor korisniku/ci @hughsient @zygoon @mjg59
The tools are expensive but most important to have the right team and people focusing on those problems, which would be the hardest part to solve.
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov 27. sij
Odgovor korisniku/ci @hughsient @mjg59
It was great to have you! I really like your way of thinking of fixing those problems over extending LVFS for additional supply chain checks and more. It will give the industry important visibility on the problem at scale.
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Richard Hughes 27. sij
I wrote a bit about hunting for UEFI Implants, and realising that we’re failing as an industry -- along with some ideas of things we could do to fix it. Comments welcome, especially from and ...
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Juliano Rizzo 27. sij
Yet another Intel CPU flaw affects SGX. 2020: Please stop cheating by "solving" crypto problems with SGX magic, it does not work.
Reply Retweet Označi sa "sviđa mi se"
Alex Matrosov proslijedio/la je tweet
Ali Abbasi 22. sij
For those who attended our talk with at , I will push the client utility for Siemens S7 bootloader arbitrary code execution here:
Reply Retweet Označi sa "sviđa mi se"