|
Ulf Frisk
@
UlfFrisk
Sweden
|
|
IT-Security Minion | DMA Hacker | blog.frizk.net | PCILeech | MemProcFS
|
|
|
1.626
Tweetovi
|
731
Pratim
|
4.508
Osobe koje vas prate
|
| Tweetovi |
| Ulf Frisk proslijedio/la je tweet | ||
|
Eclypsium
@eclypsium
|
30. sij |
|
Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, @HackingThings and @jessemichael show that high speed DMA attacks can bypass hardware protections on enterprise devices. bit.ly/313EEqN pic.twitter.com/OWhEux8F78
|
||
|
|
||
| Ulf Frisk proslijedio/la je tweet | ||
|
Joseph Cox
@josephfcox
|
27. sij |
|
New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"
vice.com/en_us/article/…
|
||
|
|
||
| Ulf Frisk proslijedio/la je tweet | ||
|
Luca Marcelli
@layle_ctf
|
26. sij |
|
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;)
Don't forget to patch! pic.twitter.com/FekupjS6qG
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
26. sij |
|
Anyone know if there are plans for nested Hyper-V on AMD/EPYC/Ryzen? pic.twitter.com/DLp2k2Gaxb
|
||
|
|
||
| Ulf Frisk proslijedio/la je tweet | ||
|
Joe Fitz
@securelyfitz
|
23. sij |
|
I was hoping to give the first peek at some new research on attacking high speed interfaces at @TheSAScon, and they were kind enough to accept! See you in Barcelona... pic.twitter.com/AZx23qzX8H
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
22. sij |
|
Sure, just send me a DM :)
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
21. sij |
|
haha, yeah, mbe I should get that one instead 😀 CPU is huge
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
21. sij |
|
Got myself a new AMD 😀 can't wait to try it out! Hopefully cooler will arrive tomorrow... pic.twitter.com/6BnK59BQUp
|
||
|
|
||
| Ulf Frisk proslijedio/la je tweet | ||
|
—(÷[ Nate Warfield speaking @ BlueHat IL ]÷)—
@n0x08
|
20. sij |
|
bluehatil.com/speakers - I’ve been waiting to announce this all month; I’ll be crossing another conference off my speaking bucket list in ~2wks when I go onstage at @BlueHatIL!
I’ve been waiting for this for 2+ years - I might be a little excited about it 🤩
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
20. sij |
|
Huge Congratz man, BlueHatIL is such an awesome event! Had an awesome time speaking last year 😀
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
19. sij |
|
totally agree on the now mitigated hardlinks. they are less interesting now.
I understand why ppl are doing it tho. a cve looks nicer on the cv than no cve...
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
19. sij |
|
a bug can sometimes be interesting and worthy of a write-up even tho it might not exist in the latest and greatest. regardless of cve and bounty.
|
||
|
|
||
| Ulf Frisk proslijedio/la je tweet | ||
|
Yarden Shafir
@yarden_shafir
|
16. sij |
|
After a lot of work and some crypto-related delays, I couldn't be more proud to publish @aionescu's and mine latest research - The complete overview of CET internals on Windows (so far!):
windows-internals.com/cet-on-windows/
|
||
|
|
||
| Ulf Frisk proslijedio/la je tweet | ||
|
SwiftOnSecurity
@SwiftOnSecurity
|
14. sij |
|
COMMENTARY ON CVE-2020-0601:
I have been speaking to several players on this on background and there are a few things they want to highlight / clarify based on the public discourse so far.
|
||
|
|
||
| Ulf Frisk proslijedio/la je tweet | ||
|
—(÷[ Nate Warfield speaking @ BlueHat IL ]÷)—
@n0x08
|
14. sij |
|
portal.msrc.microsoft.com/en-US/security… - here it is folks.
The first sentence is key; this is not remote, not code execution, not "MS17-010 bad".
Should you patch? Absolutely. Is it the end of computers as we know it? Lol, no, not even close.
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
7. sij |
|
maybe, I have not looked into it, I don't really support it any more coz of the horribly outdated dev environment. I'm not going to do it tho. But the ScreamerM2 is a quite nice board...
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
7. sij |
|
no, I'm not aware, I have not looked into it into detail yet, but you'll be able to get most PCIe TLP packets onto other computers USB as-is now.
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
7. sij |
|
It's also possible to configure FPGA PCIe core to receive most config packets on software interface - mbe it's even possible to emulate a device in software (not implemented tho).
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
7. sij |
|
Rebuild and flash FPGA to activate custom configspace (recommended), or activate on pre-built bitstream by calling LeechCore library API (less recommended).
|
||
|
|
||
|
Ulf Frisk
@UlfFrisk
|
7. sij |
|
PCILeech FPGA custom PCIe configspace now supported! Mimic real devices more closely for research purposes 😈
Also, code signing of binaries.
github.com/ufrisk/pcileec…
github.com/ufrisk/pcileech pic.twitter.com/EA0hP0PdPL
|
||
|
|
||