| Tweetovi |
| Gal Zror proslijedio/la je tweet | ||
|
jonathan Afek
@JonathanAfek
|
27. sij |
|
Can't wait to present the progress we've made since #BHEU at @offensive_con! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer. #offensivecon pic.twitter.com/xfEaCdgraH
|
||
|
|
||
| Gal Zror proslijedio/la je tweet | ||
|
Vera Mens
@V3rochka
|
15. sij |
|
Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary!
Hope that will help you too :)
github.com/alephsecurity/… pic.twitter.com/YmgTMhLJXR
|
||
|
|
||
| Gal Zror proslijedio/la je tweet | ||
|
Aleph Research
@alephsecurity
|
14. sij |
|
Ruckus vulnerability research by @waveburst is now online, several critical vulnerabilities found. Check it out: alephsecurity.com/2020/01/14/ruc…
|
||
|
|
||
|
Gal Zror
@waveburst
|
5. sij |
|
Unfortunately busybox shell is not enough for installing openwrt on a router. You need openwrt to support the device hardware. As far as I know, openwrt do not support ruckus devices.
|
||
|
|
||
|
Gal Zror
@waveburst
|
5. sij |
|
Yes, that's right. "ZoneFlex" and "Unleashed" firmware look very different and I doubt if they share any codebase. However, "ZoneDirectory" firmware shares some vulnerable codebase with "Unleashed".
|
||
|
|
||
| Gal Zror proslijedio/la je tweet | ||
|
Lifehacker
@lifehacker
|
30. pro |
|
Got a Ruckus brand product? You need to update that thing right away: lifehac.kr/dbPqnDc pic.twitter.com/ISJCzvIxCr
|
||
|
|
||
|
Gal Zror
@waveburst
|
30. pro |
|
Thanks #36c3 for a wonderful congress!! It was an honor to be a part of it! pic.twitter.com/qm3GvuoZjT
|
||
|
|
||
| Gal Zror proslijedio/la je tweet | ||
|
Aleph Research
@alephsecurity
|
29. pro |
|
Phishing is anyone's problem, but now it can get you in ways you didn't expect and for many users, no proper mitigation is currently available. Check it out: alephsecurity.com/2019/12/29/rev…
|
||
|
|
||
|
Gal Zror
@waveburst
|
29. pro |
|
If you missed it last night here's a video of my talk last night at #36c3
media.ccc.de/v/36c3-10816-d…
|
||
|
|
||
|
Gal Zror
@waveburst
|
29. pro |
|
Here's a video of my talk last night at #36c3
media.ccc.de/v/36c3-10816-d… twitter.com/TechCrunch/sta…
|
||
|
|
||
|
Gal Zror
@waveburst
|
29. pro |
|
|
||
|
Gal Zror
@waveburst
|
28. pro |
|
My talk: Don't Ruck us to hard - Owning Ruckus AP devices fahrplan.events.ccc.de/congress/2019/…
starts in 2 hours! If you're on #36c3 see me at #Dijkstra hall or watch it on streaming.media.ccc.de/36c3/halld pic.twitter.com/k1gYc4lnZe
|
||
|
|
||
|
Gal Zror
@waveburst
|
26. pro |
|
Ruckus network has confirmed 10 CVEs I filed. Some of them are critical. Users should check that they are using their latest firmware!! I will talk about them this Saturday at #36c3 pic.twitter.com/tFMhWpQW0a
|
||
|
|
||
| Gal Zror proslijedio/la je tweet | ||
|
NULLCON
@nullcon
|
24. pro |
|
Gal Zror (@waveburst), research team leader in Aleph Research group (@alephsecurity) at HCL AppScan (@AppScanHCL) will present a talk on “Don't Ruck Us Too Hard - Owning All of Ruckus AP devices”.
🎟️Register👉 bit.ly/2uDTJzF
#Nullcon #Nullcon2020 #Wireless #Security pic.twitter.com/ffg7LCcOPg
|
||
|
|
||
|
Gal Zror
@waveburst
|
23. pro |
|
I am excited to present my vulnerability research this Saturday at #36C3! I will show three different RCEs that I discovered on Ruckus Wireless access points. I hope #BHEU check for updates often :) pic.twitter.com/BEfZpofJjn
|
||
|
|
||
|
Gal Zror
@waveburst
|
19. pro |
|
|
||
|
|
||