Alexander (@dark_k3y) 's Twitter Profile
Alexander

@dark_k3y

F-Secure fellow; ICS Security, hardware hacking, distributed systems researching.

ID: 813187698

calendar_today09-09-2012 14:03:36

821 Tweet

1,1K Takipçi

176 Takip Edilen

Timo Hirvonen (@timohirvonen) 's Twitter Profile Photo

Inspired by Joshua J. Drake’s Pwn2Own exploit from 2013 and j00ru//vx’s awesome ‘One font vulnerability to rule them all’, I discovered and exploited a Type 1 font vulnerability leading to RCE on a somewhat unconventional target. Any interest in a detailed write-up :)?

hardwear.io (@hardwear_io) 's Twitter Profile Photo

📡4 day Training on Advanced Microcontrollers Firmware Exploitation with Alexander & Tao Sauvage Explore the challenges when you reverse engineer embedded devices found in Automotive, IoT sensors, smart home system 🐞More details about the Target device bit.ly/36yj0xI

📡4 day Training on Advanced Microcontrollers Firmware Exploitation with <a href="/dark_k3y/">Alexander</a> &amp; Tao Sauvage

Explore the challenges when you reverse engineer embedded devices found in Automotive, IoT sensors, smart home system

🐞More details about the Target device bit.ly/36yj0xI
Alexander (@dark_k3y) 's Twitter Profile Photo

I remember one ICS gateway that avoided RCE because HTTP library in their firmware was too old and didn't have memory corruption from the newer versions. ICS is the best sometimes.

Alexander (@dark_k3y) 's Twitter Profile Photo

My university professor on electronics 101 is always told us that "electronics is a science about contacts". I was totally disagree with him when I was young, but it looks like he was right from the beginning.

Trevor Bedford (@trvrb) 's Twitter Profile Photo

With #COVID19 vaccine efficacy of ~95%, I'm looking forward to vaccine distribution in 2021 bringing the pandemic under control. However, I'm concerned that we'll see antigenic drift of SARS-CoV-2 and may need to update the strain used in the vaccine with some regularity. 1/18

t2.fi (@t2_fi) 's Twitter Profile Photo

2021 is already crazier than 2020. We apologize for not bringing better news. If you can sponsor us with 200 COVID19 vaccine doses (MVP & lifetime free entry), t2’21 can happen. Otherwise the Advisory Board is preparing for t2’22 t2.fi/2021/01/08/t2-… #t2infosec #wewillreturn

hardwear.io (@hardwear_io) 's Twitter Profile Photo

💡Reverse engineering & exploiting embedded devices based on the #microcontrollers brings in advanced level of challenges ✅Enroll to Learn the tricks to Exploit Advance Microcontrollers Firmware with Alexander & Tao Sauvage ➡️bit.ly/36yj0xI #Hardwaresecurity #hw_io

💡Reverse engineering &amp; exploiting embedded devices based on the #microcontrollers brings in advanced level of challenges

✅Enroll to Learn the tricks to Exploit Advance Microcontrollers Firmware with <a href="/dark_k3y/">Alexander</a> &amp; Tao Sauvage

➡️bit.ly/36yj0xI

#Hardwaresecurity #hw_io
hardwear.io (@hardwear_io) 's Twitter Profile Photo

⚡IC Reverse Engineering & Code Dump training by Olivier Olivier THOMAS is designed to give to IC professionals, newcomers a deep understanding of the complete RE & for building more secure designs ✅Enroll for #hardwear_io Germany Training bit.ly/2MRUZft #hardwaresecurity

⚡IC Reverse Engineering &amp; Code Dump training by Olivier <a href="/reivilo_t/">Olivier THOMAS</a> is designed to give to IC professionals, newcomers a deep understanding of the complete RE &amp; for building more secure designs

✅Enroll for #hardwear_io Germany Training bit.ly/2MRUZft

#hardwaresecurity
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

In a success with unexpected actions, Alexander, Timo Hirvonen, and @InfoSecDJ of WithSecure Labs played some AC/DC through the HP LaserJet printer while exploiting it. They're off to the disclosure call to discuss the details (and their playlist). Video/audio to come #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

(Sound On) Confirmed! The team from WithSecure Labs used a stack-based buffer overflow to take over an HP LaserJet and turn it into a jukebox. Their efforts earn them $20,000 and 2 Master of Pwn points. #Pwn2Own gfycat.com/anchoreddiffer…

WithSecure Labs (@fsecurelabs) 's Twitter Profile Photo

What did the printer say when it saw Timo Hirvonen and Alexander? Oh sheet! Read how the WithSecure Labs Red Team is Printing off the land by printing their own shellz - labs.f-secure.com/publications/p… CVE-2021-39237 (labs.f-secure.com/advisories/hp-…) & CVE-2021-39238 (labs.f-secure.com/advisories/hp-…)

What did the printer say when it saw <a href="/TimoHirvonen/">Timo Hirvonen</a>  and <a href="/dark_k3y/">Alexander</a>? Oh sheet! 

Read how the <a href="/FSecureLabs/">WithSecure Labs</a> Red Team is Printing off the land by printing their own shellz - labs.f-secure.com/publications/p…

CVE-2021-39237 (labs.f-secure.com/advisories/hp-…) &amp; CVE-2021-39238 (labs.f-secure.com/advisories/hp-…)
Timo Hirvonen (@timohirvonen) 's Twitter Profile Photo

Playing AC/DC on a printer at Pwn2Own wasn’t the first time Alexander and I hacked printers. We warmed up by targeting the other main HP product line, the FutureSmart MFPs. Here’s the full story, including the details of the exploit development process: labs.f-secure.com/publications/p…

Andrea Barisani (@andreabarisani) 's Twitter Profile Photo

Today we are announcing F-Secure Armory Drive. An encrypted storage solution for the USB armory with Secure Boot (our keys or yours, it's your choice), Open Source firmware + API, Firmware Transparency. f-secure.com/en/press/p/enc… f-secure.com/en/consulting/… github.com/f-secure-found…