Xeno Kovah(@XenoKovah) 's Twitter Profileg
Xeno Kovah

@XenoKovah

Interested in reverse engineering, firmware, bluetooth, trusted computing, and training. Founder of OpenSecurityTraining2 https://t.co/slK2fsMRwU

ID:2362664118

linkhttps://darkmentor.com/publication calendar_today26-02-2014 13:15:10

4,0K Tweets

12,2K Followers

75 Following

Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

Another example of how teaching for and teaching in person aren’t mutually exclusive. Check out Cedric Halbronn’s training if you want in-person support and guidance not just on the basics of exploits, but in the actual engineering that goes into making reliable exploits

account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

My next class will be an introduction to Bluetooth Low Energy (BLE) security, where I will be the co-instructor and Veronica Kovah will be the primary instructor (since she’s the one with the 1337 ‘sploits not me ;))

account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

Bump for the Monday crowd. FYI it’s something Amazon-related. One theory is it’s possibly a Ring camera?

account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

Does anyone have a device that advertises itself as “rnet” via Bluetooth Low Energy, and if so, what is it?

account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

My next in-person training will be at hardwear.io May 28-30th in Santa Clara USA

I’ll once again be teaching in my All-You-Can-Learn Buffet style, which will include the new RISC-V Assembly material (+ firmware security, C/C++ vuln hunting, etc)

hardwear.io/usa-2024/train…

My next in-person training will be at @hardwear_io May 28-30th in Santa Clara USA I’ll once again be teaching in my All-You-Can-Learn Buffet style, which will include the new RISC-V Assembly material (+ firmware security, C/C++ vuln hunting, etc) hardwear.io/usa-2024/train…
account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

Ali Hadi Ali Hadi | B!n@ry who was an OST1 instructor, reached out about contributing a class to . And when he learned about ost2.fyi/Sponsorship.ht… he said he wanted to Sponsor OST2 too! I look forward to seeing the DFIR material he’ll be creating, and appreciate the sponsorship!

account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

I also duplicated my Vulns1001/2 classes and gave them separate URLs as ost2.fyi/SecDev1001 and ost2.fyi/SecDev1002, because I want to make it more clear to developers that those classes are for them too, not just vuln hunters

account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

We’ve added a new “Secure Software Design & Implementation” (SecDev) learning path to OST2 in recognition of the existing classes like Vulns1001/SecDev1001, but also to prepare for future classes that instructors have volunteered to create

ost2.fyi/Secure%20Softw…

We’ve added a new “Secure Software Design & Implementation” (SecDev) learning path to OST2 in recognition of the existing classes like Vulns1001/SecDev1001, but also to prepare for future classes that instructors have volunteered to create ost2.fyi/Secure%20Softw…
account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

This was a good example of a student asking a question and then me saying “I think you’ve been given all the tools you need from Arch1001 and Arch2001 to find the answer yourself”, and then he did :)

account_circle
Theo(@theokwebb) 's Twitter Profile Photo

I just published my first blog post on Interrupt Handling and Stack Switching in x86-64 Architecture, inspired by some difficulties I faced in a lab from Xeno Kovah’s Arch2001 x86-64 OS Internals course at OpenSecurityTraining2.
theokwebb.github.io/posts/interrup…

account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

The YouTube playlist for “Architecture 4001: Intel Firmware Attack & Defense” class is now public for those who like to download videos:
youtube.com/playlist?list=…

But as always, the best way to learn the material is with the full class at ost2.fyi/Arch4001

account_circle
Xeno Kovah(@XenoKovah) 's Twitter Profile Photo

“On the ACE3 however, Apple upped their game: Firmware updates are personalized to the device, debug interfaces seem to be disabled, and the external flash is validated and does not contain all the firmware.” 🤔👍

account_circle