
Philippe Teuwen
@doegox
If you can't root it you don't own it.
doegox infosec exchange
ID: 310491337
http://wiki.yobi.be 03-06-2011 20:59:56
5,5K Tweet
4,4K Followers
1,1K Following

Ever used a disassembler? Find out how Phil BARRETT used one to recover a "deleted" ECU firmware update using branches blog.quarkslab.com/recovering-an-…


Great talk on HydraDancer by QuarksLab(quarkslab) / Thiébaud Fuchs(github.com/kauwua) at Pass the SALT Conference #pts24 Check it out: cfp.pass-the-salt.org/pts2024/talk/E… HydraDancer Dongle V1 R1 coming soon! Ultra-small aluminum anodized + laser engraving enclosure: 53mm x 33mm x 15mm.



Dive deep into heap exploitation, glibc internals, and clever tricks with Tom Mansion latest write-up on a challenging HitconCTF 2024 heap pwn! blog.quarkslab.com/heap-exploitat…


It's day 1 of Black Hat USA #BHUSA 🎉 Today Quarkslab's engineer Maxime Rossi Bellom will talk about the chain of vulns affecting Samsung Galaxy A* series phones nominated for Best Mobile Bug of the year by the Pwnie Awards Join him in the South Seas AB, Level 3 at 3:20pm


After two years of hard work with Damien Cauquil (@[email protected]) , we are proud to release for DEFCON32 the first public version of WHAD, a whole new ecosystem of opensource libs, tools & firmwares for wireless security ! The main repo is here: github.com/whad-team/whad… . And now, demo time ! [1/n]

Chinese Backdoor Alert! Security enhancements on Mifare Classic cards used in hotels/business contain a supply chain backdoor making reading & exploitation trivial. Great paper by Philippe Teuwen Quarkslab eprint.iacr.org/2024/1275.pdf Watch your Chinese supply chains carefully folks!

Are "MIFARE-compatible" contactless cards not playing fair? That's what you may wonder after Philippe Teuwen spotted some odd behavior. Curiosity led to experiments to devise a new attack technique that uncovered some backdoors. The RFID hacking spirit lives on! blog.quarkslab.com/mifare-classic…



🔓 Unmasking the Flaws in MIFARE Classic Smart Cards: Uncover ongoing vulnerabilities in these widely used cards at hotels, offices, and more. Join Philippe Teuwen at #hw_ioNL2024 for a deep dive into attack strategies and countermeasures Link hardwear.io/netherlands-20… #MIFARE #keycards





Why limit ourselves? 🤷♂️ Let's talk about making our tools compatible with a wider range of hardware! ✨ Join Damien Cauquil (@[email protected]) and Romain Cayre at #hw_ioNL2024 to explore the need for a universal protocol that simplifies research 👉 hardwear.io/netherlands-20… #WHAD #wirelessprotocols



Finding and chaining 4 vulns to exfiltrate encryption keys from the Android Keystore on Samsung series A* devices. Did you miss the "Attacking the Samsung Galaxy A* Boot Chain" talk by Maxime Rossi Bellom and Raphaël Neveu earlier this year ? Talk && PoC || GTFO: blog.quarkslab.com/attacking-the-…




