|
Alex Matrosov
@
matrosov
Portland, OR
|
|
IDAholic, #CodeXplorer, @REhints, "Rootkits and Bootkits" book co-author (bootkits.io), BIOS voodoo, and TEE exorcist.
Chief Offensive REsearcher at @NVIDIA
|
|
|
5.836
Tweetovi
|
1.345
Pratim
|
12.900
Osobe koje vas prate
|
| Tweetovi |
| Alex Matrosov proslijedio/la je tweet | ||
|
Dave dwizzzle Weston
@dwizzzleMSFT
|
6 h |
|
Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from @BlueHatIL 2019: github.com/dwizzzle/Prese…
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Casey Smith
@subTee
|
22 h |
|
Custom Signed Kernel Driver's
Pretty cool 😃
Without the need to enable TestSigning.
Sample Project:
github.com/HyperSine/Wind… pic.twitter.com/opyM91m1HI
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Black Hat
@BlackHatEvents
|
3. velj |
|
Announcement: The Black Hat USA Call for Papers is now open! Submit your proposal for the chance to present your research at the premier security conference in Vegas. View the submission requirements and apply here: ow.ly/6zbW50yck7o
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Andrey Konovalov
@andreyknvl
|
29. sij |
|
Implemented a PoC for disabling kernel lockdown on Ubuntu via a keyboard emulated through USB/IP, CC @mjg59
github.com/xairy/unlockdo…
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Brian Richardson
@Intel_Brian
|
3. velj |
|
Video from my @fosdem presentation is now available.
"Capsule Update & LVFS: Improving system firmware updates"
fosdem.org/2020/schedule/…
#FOSDEM2020 #UEFI @tianocore #lvfs #opensource pic.twitter.com/0hM6my3Omv
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Aleksei
@hellman1908
|
2. velj |
|
I am starting a blog. First post is about the StarkWare Hash Challenge affine.group/2020/02/starkw…
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Yarden Shafir
@yarden_shafir
|
2. velj |
|
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these!
windows-internals.com/dkom-now-with-…
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Daniel Maslowski
@OrangeCMS
|
1. velj |
|
I am quite exhausted from the sheer complexity of the #firmware research I have been doing, having just spoken about the @intel ME at @fosdem. Now it's your turn: Please look into it as well and post your follow-up insights! ✨👩🏻💻
Slides: metaspora.org/look-at-me-fos…
Video will follow. pic.twitter.com/U75LfQZqXt
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
FireF0X
@hFireF0X
|
2. velj |
|
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Kraken Exchange
@krakenfx
|
31. sij |
|
🚨It took Kraken Security Labs just 15 minutes to hack both of @trezor’s crypto hardware wallets.
Here’s how we did it and what it means if you’re a user:
blog.kraken.com/post/3662/krak…
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Kostya Serebryany
@kayseesee
|
30. sij |
|
HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. developer.android.com/ndk/guides/hwa…
HWASAN is also available on Aarch64 Linux with a recent kernel.
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
James Forshaw
@tiraniddo
|
30. sij |
|
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is). tiraniddo.dev/2020/01/dont-u…
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
j00ru//vx
@j00ru
|
30. sij |
|
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy! googleprojectzero.blogspot.com/2020/01/part-i…
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Real World Crypto
@RealWorldCrypto
|
28. sij |
|
Many of the slide-decks from Real World Crypto 2020 are now available online via: rwc.iacr.org/2020/program.h…
Videos at: totalwebcasting.com/view/?func=VOF…
Feedback survey at: surveymonkey.com/r/6X3MM92
#realworldcrypto
|
||
|
|
||
|
Alex Matrosov
@matrosov
|
28. sij |
|
unfortunately I don’t know good resource with an explanation of badness to having active uefi shell. But it’s definitely create additional supply chain security risk. Downgrade microcode, abuse update process or attack SMI handlers will be much easier (ThinkPwn). Many other stuff
|
||
|
|
||
|
Alex Matrosov
@matrosov
|
27. sij |
|
The tools are expensive but most important to have the right team and people focusing on those problems, which would be the hardest part to solve.
|
||
|
|
||
|
Alex Matrosov
@matrosov
|
27. sij |
|
It was great to have you! I really like your way of thinking of fixing those problems over extending LVFS for additional supply chain checks and more. It will give the industry important visibility on the problem at scale.
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Richard Hughes
@hughsient
|
27. sij |
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Juliano Rizzo
@julianor
|
27. sij |
|
Yet another Intel CPU flaw affects SGX. 2020: Please stop cheating by "solving" crypto problems with SGX magic, it does not work. cacheoutattack.com #cacheout
|
||
|
|
||
| Alex Matrosov proslijedio/la je tweet | ||
|
Ali Abbasi
@bl4ckic3
|
22. sij |
|
For those who attended our talk with @ScepticCtf at #s4x20 , I will push the client utility for Siemens S7 bootloader arbitrary code execution here:
github.com/RUB-SysSec/Sie…
|
||
|
|
||