Craig  Young (@craigtweets) 's Twitter Profile
Craig Young

@craigtweets

Pwnie winner, 2x USENIX author, InfoSec speaker/trainer, ProdSec engineer.

My next event is Black Hat USA.

Tweets do not reflect past or present employers.

ID: 16473558

linkhttps://secur3.us calendar_today26-09-2008 19:58:44

1,1K Tweet

1,1K Followers

241 Following

Craig  Young (@craigtweets) 's Twitter Profile Photo

This quick write-up from Edouard Lafargue on using universal radio hacker (urh) to identify an unknown signal is well worth the read. elafargue.github.io/gr-experiments…

Craig  Young (@craigtweets) 's Twitter Profile Photo

Looking forward to being back in Toronto for SecTor Security Con! In case you are able to make it, consider coming a little earlier and joining me to learn about Ghidra with an Black Hat training session! More info: blackhat.com/tr-22s/trainin…

Craig  Young (@craigtweets) 's Twitter Profile Photo

Registration is now open for #BHUSA training. I'm looking forward to another year of teaching Ghidra in Vegas! Please come and join me if you want to get started using Ghidra for your reversing needs: blackhat.com/us-23/training…

Craig  Young (@craigtweets) 's Twitter Profile Photo

I've published a sneak peak of a new exercise I'll be running in my Ghidra class with Black Hat. This one covers using Ghidra Debugger to analyze a sketchy lib file. Sample file included for practice, hoping someone will find the hidden URL! medium.com/@cy1337/a-guid… #BHUSA

Craig  Young (@craigtweets) 's Twitter Profile Photo

I've posted another Ghidra challenge in preparation for 'A Guide to Reversing With Ghidra' at #BHUSA this summer. Have a read and try for yourself at link.medium.com/jjTrhleSSyb

Craig  Young (@craigtweets) 's Twitter Profile Photo

For this week's Black Hat 2023 Ghidra training preview, I've releases a vulnerability discovery challenge. It was a lot of fun making this and I hope you all enjoy hacking it! medium.com/@cy1337/vulner… #BHUSA

juraj somorovsky (@jurajsomorovsky) 's Twitter Profile Photo

In our newest USENIX paper, @XoIMEX, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Jörg Schwenk, and me took a look at the TLS session ticket deployment in the wild and found diverse vulnerabilities: upb-syssec.github.io/blog/2023/sess… (1/12)

Craig  Young (@craigtweets) 's Twitter Profile Photo

I've posted a walkthrough about understanding and patching a bug using Ghidra's disassembly. Please enjoy following along and I hope you'll consider joining me this summer in Vegas for my Black Hat #BHUSA Ghidra training. medium.com/@cy1337/patchi…

Craig  Young (@craigtweets) 's Twitter Profile Photo

Update on my recent vuln discovery challenge: It's now containerized! Details are in my latest Black Hat #BHUSA Ghidra training blog post: Vulnerability Analysis with Ghidra Scripting at medium.com/@cy1337/vulner…

Craig  Young (@craigtweets) 's Twitter Profile Photo

Here is a walkthrough of writing a Ghidra Python script to find calls to potentially dangerous libc functions as the 5th in my Black Hat #BHUSA training preview. medium.com/@cy1337/vulner…

Craig  Young (@craigtweets) 's Twitter Profile Photo

The dedicated emulator tool in 10.3 is also really cool! I made a short post this morning to help people get started using it with an example. medium.com/@cy1337/first-…

Craig  Young (@craigtweets) 's Twitter Profile Photo

This week's post is about unpacking a Metasploit payload with Ghidra and then resolving syscall numbers in the shellcode for easier analysis. Check it out on Medium at medium.com/@cy1337/unpack…

Jack (@stryker2k2) 's Twitter Profile Photo

Unpacking Shellcode from MSFVenom XOR Payload with Ghidra Emulator following a blog post from Craig Young youtu.be/eyHFuTi59k4 #CyberSecurity #Ghidra #Linux #InfoSec #Kali

Joe Pettit (@joepettit2) 's Twitter Profile Photo

Cybersecurity may seem like a vast field, but there are frequent chances to reconnect with old friends at conferences or while working on projects. Tyler Reguly reflects on the collaborative nature of the cybersecurity community. tripwire.com/state-of-secur… cc Craig Young

Craig  Young (@craigtweets) 's Twitter Profile Photo

Just updated my Black Hat training slides with an example of decrypting Mirai config values using #Ghidra 10.3's new Emulator tool. Stay tuned for some related blogs in coming weeks after I'm done updating the class for 10.3! #bhusa blackhat.com/us-23/training…

Craig  Young (@craigtweets) 's Twitter Profile Photo

Check out my intro on fuzzing compiled code with AFL QEMU: medium.com/@cy1337/a-basi… This is a sneak peak of the content I'm working on for Black Hat this summer.

Craig  Young (@craigtweets) 's Twitter Profile Photo

I just posted another example from my upcoming class. A write-up on generating a GDB Python script from Ghidra Python to enumerate attack surface in a program. medium.com/@cy1337/a-basi… This is the last week for early bird pricing, so if you want to dive deeper, sign up today!