💻📡🛰️ IooNag (@ioonag) 's Twitter Profile
💻📡🛰️ IooNag

@ioonag

ID: 1682839429

calendar_today19-08-2013 09:27:16

163 Tweet

533 Followers

318 Following

Hack-A-Sat (@hack_a_sat) 's Twitter Profile Photo

🏆 Team SolarWine SolarWine 2⃣ Team PolandCanIntoSpace Dragon Sector/p4 3⃣ Team DiceGang DiceGang Congrats to all 8 teams who participated in the Hack-A-Sat 2 final event CTF and thank you to everyone who tuned in all weekend! #HAS2Finals

🏆 Team SolarWine <a href="/solarwine_ctf/">SolarWine</a>
2⃣ Team PolandCanIntoSpace <a href="/DragonSectorCTF/">Dragon Sector</a>/<a href="/p4_team/">p4</a>
3⃣ Team DiceGang <a href="/dicegangctf/">DiceGang</a>

Congrats to all 8 teams who participated in the Hack-A-Sat 2 final event CTF and thank you to everyone who tuned in all weekend! #HAS2Finals
ZK Hack (@__zkhack__) 's Twitter Profile Photo

ZK Hack is wrapped up… for now. Read about how the first edition of workshops and puzzles went in our blog post medium.com/zero-knowledge…

Mark Ermolov (@_markel___) 's Twitter Profile Photo

The very important goal has been achieved, for the benefit of the entire information security society: we decrypted Intel XuCode!

The very important goal has been achieved, for the benefit of the entire information security society: we decrypted Intel XuCode!
Ledger Donjon (@donjonledger) 's Twitter Profile Photo

Last week, we presented our research on Intel Wi-Fi chips at SSTIC. Our talk and our slides are now available: sstic.org/2022/presentat…. It features a demo of a DMA attack from the Wi-Fi chip! We also published our tools to interact with some Intel chips: github.com/Ledger-Donjon/…

Last week, we presented our research on Intel Wi-Fi chips at <a href="/sstic/">SSTIC</a>. Our talk and our slides are now available: sstic.org/2022/presentat…. It features a demo of a DMA attack from the Wi-Fi chip!  We also published our tools to interact with some Intel chips: github.com/Ledger-Donjon/…
SolarWine (@solarwine_ctf) 's Twitter Profile Photo

We've finally published our quals & finals write-ups from last year's #HackASat along with the quals write-ups from this year: github.com/solar-wine/wri…

CVE (@cvenew) 's Twitter Profile Photo

CVE-2022-34835 In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function. cve.mitre.org/cgi-bin/cvenam…

Charles Guillemet (@p3b7_) 's Twitter Profile Photo

Ghost In the Wireless, iwlwifi Edition. Nicolas Iooss (💻📡🛰️ IooNag) is presenting the research he did with Gabriel Campana from Ledger Donjon team on Intel Wi-Fi chips at #blackhat22. They did a complete reverse of the firmware and found several critical vulnerabilities Live 🧵👇

Ghost In the Wireless, iwlwifi Edition.

Nicolas Iooss (<a href="/IooNag/">💻📡🛰️ IooNag</a>) is presenting the research he did with Gabriel Campana from <a href="/DonjonLedger/">Ledger Donjon</a> team on Intel Wi-Fi chips at #blackhat22. They did a complete reverse of the firmware and found several critical vulnerabilities

Live 🧵👇
Lúcás Meier (@cronokirby) 's Twitter Profile Photo

crypto.stanford.edu/~dabo/cryptobo… Oh hey, a new version of Boneh and Shoup just dropped, and now it even has a section on MPC and UC security!!!

Mark Ermolov (@_markel___) 's Twitter Profile Photo

It seems this leak affects not only Intel Boot Guard technology, but all OEM signing-based mechanisms in CSME, such as OEM unlock (Orange Unlock), ISH firmware, SMIP and others...

Tom Forsyth (TODO: fix my heart or die) (@tom_forsyth) 's Twitter Profile Photo

Ken Shirriff If you want to know more about the origins of AVX-512, I did a lecture about it: guide.handmade-seattle.com/c/2019/talks/l… ...or the extended length slides: tomforsyth1000.github.io/papers/LRBNI%2…

Dominic White 👾 (@singe) 's Twitter Profile Photo

This ssh-agent exploitation write up is worth reading to the end. First up the whole chain and how they figured it out is well documented and super interesting. They chain a bunch of shared library loads to create a jump into their executable shell code. But there’s a hidden gem

This ssh-agent exploitation write up is worth reading to the end. First up the whole chain and how they figured it out is well documented and super interesting. They chain a bunch of shared library loads to create a jump into their executable shell code. But there’s a hidden gem
Mickaël Salaün (@l0kod) 's Twitter Profile Photo

Microsoft Azure Boost: tailored Linux distro focused on security that provides offloading and acceleration to power the Azure fleet. Great talk by Luca at All Systems Go!! TPM, SELinux, dm/fs-verity, portable services, FPGA, DPDK... cfp.all-systems-go.io/all-systems-go… youtu.be/iB-wRdC8zNs

Mickaël Salaün (@l0kod) 's Twitter Profile Photo

We gave two talks about Hypervisor Enforced Kernel Integrity and Linux Virtualization Based Security at #LinuxPlumbers - Leveraging KVM or Hyper-V to harden a VM: - overview: lpc.events/event/17/contr… - KVM: lpc.events/event/17/contr… - code: github.com/heki-linux

ZK Hack (@__zkhack__) 's Twitter Profile Photo

🧵🧵🧵 In this thread we’ll talk about the coolest 𝐙𝐊 𝐇𝐚𝐜𝐤 𝐈𝐕 price awarded by Zero Knowledge Podcast to the puzzle competition Top 3. 🥈🥇🥉 But first let’s appreciate how awesome 𝐙𝐊 𝐇𝐚𝐜𝐤 𝐈𝐕 was… We're very sad it ended... Yet so grateful it happened…  🥹😭🥲

Ledger Donjon (@donjonledger) 's Twitter Profile Photo

We are thrilled to have open-sourced cargo-checkct, to help bridge the gap between academic research and industry practices for the early detection of timing vulnerabilities in cryptography libraries. Read more about it in our blog post. ledger.com/blog-cargo-che…