|
Phenol
@
Phenol__
|
|
Former chemistry student. Now studying at @42born2code. Doing reverse-engineering and binary exploitation for fun.
|
|
|
201
Tweetovi
|
279
Pratim
|
670
Osobe koje vas prate
|
| Tweetovi |
| Phenol proslijedio/la je tweet | ||
|
|
Éric D.
@edasfr
|
15. sij |
|
Que Mozilla soit en si mauvaise posture qu'ils doivent se séparer d'une partie de ses salariés est la mauvaise nouvelle du mois pour le Web.
Je ne sais pas si tout le monde mesure l'imperieuse nécessité de ce projet indépendant.
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
quarkslab
@quarkslab
|
16. sij |
|
[BLOG] Reverse Engineering a Philips TriMedia CPU based IP Camera - Part 3 by @crackinglandia: blog.quarkslab.com/reverse-engine…
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
Synacktiv
@Synacktiv
|
14. sij |
|
Fifty shades darker: no safe wor(l)d in SMM by @BrunoPujos
synacktiv.com/posts/exploit/…
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
KEENLAB
@keen_lab
|
2. sij |
|
Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition: keenlab.tencent.com/en/2020/01/02/…
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
C0de3
@c0de3_
|
31. pro |
|
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4) blog.lexfo.fr/cve-2017-11176…
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
Anestis Bechtsoudis
@anestisb
|
29. pro |
|
Pixel 3,4 devices use a custom packed img format for bootloader & radio (FBPK) that is not part of upstream EDK2 bootloader. Spent part of holidays reversing G's B1c1FastbootApp UEFI app & released an upacking tool as a side-product - github.com/anestisb/qc_im…
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
HackSmith
@cn0Xroot
|
29. pro |
|
The Secret Life of SIM Cards Writing, building, loading, and using code on SIM Cards [PDF]
defcon.org/images/defcon-… pic.twitter.com/3OjYCLVZRT
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
Panda
@pandasec_
|
27. pro |
|
If you're interested in Samsung's TrustZone, the talk I gave at #BHUSA2019 is online. It presents the work we did with @NeatMonster_ and @patateQbool at @quarkslab.
We are at #36c3 if you want to come say hi. :)
youtu.be/uXH5LJGRwXI
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
quarkslab
@quarkslab
|
17. pro |
|
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 2) blog.quarkslab.com/a-deep-dive-in… by @NeatMonster_, @patateQbool and @pandasec_
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
chaignc
@chaignc
|
17. pro |
|
Two days left if you want to be qualified for the #CaptureTheFIC Finals to win not one, not two but THREE @oneplus #tech
#cybersecurity #CTF #contest.
4 Teams are already qualified #security #hacker @FIC_eu
ctf.hexpresso.fr #hacker @nolimitsecu @Korben execve+auditd= <3 pic.twitter.com/2x5NP4CpJC
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
quarkslab
@quarkslab
|
10. pro |
|
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 1) blog.quarkslab.com/a-deep-dive-in… by @NeatMonster_, @patateQbool and @pandasec_
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
Sinaei
@Intel80x86
|
9. pro |
|
I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals.
The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows
Thanks to @Dark_Puzzle for answering my questions.
rayanfam.com/topics/reversi…
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
Bjoern Kerler
@viperbjk
|
30. stu |
|
As promised, here is Part 2 of my Qualcomm QDSPv6 Hexagon Reversing Blog : bkerler.github.io/2019/11/30/bri… .Yes, it does include useful stuff such as a hexagon disassembler based on python 3 and a comparison of common plugin/tools for qc hexagon disassembly. Let the patching begin :)
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
Bjoern Kerler
@viperbjk
|
15. stu |
|
Dear twitter 🤓 followers, let's start xmas early. I officially announce the start of my bigger blog series on reversing/exploiting Qualcomm QDSPv6 modem and TZ. Part 1 over here : bkerler.github.io/2019/11/15/bri…. Parts 2 - 4 will follow the next four weeks. Enjoy !
|
||
|
|
||
|
Phenol
@Phenol__
|
7. stu |
|
Y'a pas eu beaucoup de reverse a faire, puis c'est greg et charles de Armature qui on solve les challs, je leur ai juste donne un petit coup de main sur une partie :)
|
||
|
|
||
|
Phenol
@Phenol__
|
7. stu |
|
GG à Greg! Merci pour le WU !
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
ARMATURE Technologies
@ArmatureTech
|
7. stu |
|
Bravo à Greg Taube pour le write-up du Black Badge et à @Phenol__ pour son aide ! @_leHACK_
armaturetech.com/wp-content/upl…
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
Grant Hernandez
@Digital_Cold
|
7. stu |
|
How complicated is cellular baseband firmware?
At least this complicated: over 150K debugging messages across 932 directories and 2,775 files!
Rebuilding the source code skeleton from Samsung S10's Shannon S5000 baseband debugging messages.
github.com/grant-h/shanno…
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
Alexander Popov
@a13xp0p0v
|
2. stu |
|
I just did the full disclosure of the exploitable bugs in the 'vivid' driver of the Linux kernel:
openwall.com/lists/oss-secu…
|
||
|
|
||
| Phenol proslijedio/la je tweet | ||
|
Trail of Bits
@trailofbits
|
31. lis |
|
Destroying x86_64 instruction decoders with differential fuzzing blog.trailofbits.com/2019/10/31/des… pic.twitter.com/HBha70fQEx
|
||
|
|
||