Dan (@danfromuranus) 's Twitter Profile
Dan

@danfromuranus

Cyber superhero who fearlessly fortifies embedded system “The only true wisdom is in knowing you know nothing.” -Socrates

ID: 208966068

calendar_today28-10-2010 08:23:46

2,2K Tweet

50 Followers

258 Following

Dan (@danfromuranus) 's Twitter Profile Photo

Hey Apple The torch 🔦 on my iPhone16 is driving me crazy! How about adding an ambient light check before turning it on? 🌞 I really don’t need it when I’m basking on the beach 🏖️ on a sunny day.

Intrusion Expert (@intruxpert) 's Twitter Profile Photo

As expected, it got triaged! 😬🫣 If you’d like to know the bounty amount and the method I used to find this vulnerability after it’s disclosed, please retweet and like ❤️ #BugBounty #CyberSecurity #HackThePlanet #bugbountytips

As expected, it got triaged! 😬🫣

If you’d like to know the bounty amount and the method I used to find this vulnerability after it’s disclosed, please retweet and like ❤️ 

#BugBounty #CyberSecurity #HackThePlanet #bugbountytips
Dan (@danfromuranus) 's Twitter Profile Photo

When the internet began, ONE woman kept track of EVERY computer address on ARPANET. Elizabeth Feinler at Stanford managed a single text file, HOSTS.TXT, manually updating the internet’s directory. Her work paved the way for DNS. A true trailblazer. 🤯 #InternetHistory

When the internet began, ONE woman kept track of EVERY computer address on ARPANET. Elizabeth Feinler at Stanford managed a single text file, HOSTS.TXT, manually updating the internet’s directory. Her work paved the way for DNS.

A true trailblazer. 🤯 #InternetHistory
Dan (@danfromuranus) 's Twitter Profile Photo

Did you know about the Oxford Electric Bell? It’s been ringing continuously since 1840, powered by two mysterious dry-pile batteries. Scientists still aren’t sure exactly how they work—or when they’ll stop! Proof that persistence pays off. 🔔✨ #time

Did you know about the Oxford Electric Bell? It’s been ringing continuously since 1840, powered by two mysterious dry-pile batteries. Scientists still aren’t sure exactly how they work—or when they’ll stop! Proof that persistence pays off. 🔔✨ #time
Dan (@danfromuranus) 's Twitter Profile Photo

RAV4 being stolen has been shared far and wide this week. A link to some report review of how it’s done youtu.be/lEA0Y4kCggE? x.com/pmcafrica/stat…

xvonfers (@xvonfers) 's Twitter Profile Photo

Is Your Memory Protected? Uncovering Hidden Vulnerabilities in Automotive MPU Mechanisms plaxidityx.com/blog/blog-post… i.blackhat.com/EU-24/Presenta… PlaxidityX (Formerly Argus Cyber Security LTD.) Over the Air: Compromise of Modern Volkswagen Group Vehicles i.blackhat.com/EU-24/Presenta… @PC_Automotive

Dan (@danfromuranus) 's Twitter Profile Photo

Updating VMware workstation. What a total ball ache, profiles, site ID’s!! Broadcom’s website is 💩. I had to dig through the site via some hackfuckery to find it 🤦‍♂️ “Simplicity is the ultimate sophistication.”

stacksmashing (@ghidraninja) 's Twitter Profile Photo

Randomly found these cool 3D printable probes by for the OMNIFIXO that use a jumper-wire as probing needle. Especially the version with the 5 cent coins as weight works great! Might have to make a version with pogo pins :) Awesome work, IsTim! makerworld.com/en/models/5185…

Randomly found these cool 3D printable probes by for the <a href="/omnifixo/">OMNIFIXO</a> that use a jumper-wire as probing needle. Especially the version with the 5 cent coins as weight works great!

Might have to make a version with pogo pins :)

Awesome work, IsTim!

makerworld.com/en/models/5185…
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Security analysis of a TP-Link (Tapo) C210 V2 cloud camera: bootloader vulnerability and firmware decryption Interesting write up by Watchful IP watchfulip.github.io/28-12-24/tp-li… #embedded #infosec

Security analysis of a TP-Link (Tapo) C210 V2 cloud camera: bootloader vulnerability and firmware decryption

Interesting write up by <a href="/Watchful_IP/">Watchful IP</a>

watchfulip.github.io/28-12-24/tp-li…

#embedded #infosec
Daniel Estévez (@ea4gpz) 's Twitter Profile Photo

New blog post: Decoding IEEE 802.11ah. Here I analyze a recording of a baby monitor camera, which happens to use 2 MHz BW WiFi HaLow at 866 MHz. Similarly to my LTE and 5G posts, I write a Jupyter notebook to decode the signal from scratch, and write the MAC frames to PCAP.

New blog post: Decoding IEEE 802.11ah. Here I analyze a recording of a baby monitor camera, which happens to use 2 MHz BW WiFi HaLow at 866 MHz. Similarly to my LTE and 5G posts, I write a Jupyter notebook to decode the signal from scratch, and write the MAC frames to PCAP.
Roy Carrilho (@ruicarrilho5) 's Twitter Profile Photo

Here's Beej's Guide to C programming. This is probably the single best free method there is to learn C. Beej explains everything super well, and goes through every nook and cranny of the language. Better than K&R in some ways. Enjoy!

Here's Beej's Guide to C programming. This is probably the single best free method there is to learn C. Beej explains everything super well, and goes through every nook and cranny of the language. Better than K&amp;R in some ways. Enjoy!
Dan (@danfromuranus) 's Twitter Profile Photo

PhysicalFault Injection and Side-Channel Attacks on Mobile Devices A Comprehensive Analysis pure.royalholloway.ac.uk/ws/portalfiles…