liba2k (@liba2k) 's Twitter Profile
liba2k

@liba2k

ID: 1255531651326709762

calendar_today29-04-2020 16:17:48

63 Tweet

322 Takipçi

60 Takip Edilen

Insomni'hack (@1ns0mn1h4ck) 's Twitter Profile Photo

[TALK ANNOUNCEMENT] Breaking SecureBoot with SMM Vulnerability by Itai Liba & Assaf Carlsbad insomnihack.ch/confirmed-spea… #INS22 #INSO22 #Talks

CryptoCat (@_cryptocat) 's Twitter Profile Photo

This is a really handy script to automatically create a ghidra project and import/analyse the target binary, by liba2k 🔥 gist.github.com/liba2k/d522b4f…

Migo (@migoked) 's Twitter Profile Photo

New on SentinelLabs! Part 5 of @Assaf Carlsbad & liba2k series on #UEFI security research. #smm #cybersecurity #infosec sentinelone.com/labs/zen-and-t…

Assaf Carlsbad (@assaf_carlsbad) 's Twitter Profile Photo

Zen and the Art of SMM Bug Hunting: me and liba2k wrote yet another entry in our blog post series about UEFI firmware security. This time we cover SMM bug classes, discuss potential mitigations and reveal some tools & tactics we employed to uncover them. sentinelone.com/labs/zen-and-t…

Assaf Carlsbad (@assaf_carlsbad) 's Twitter Profile Photo

In what seems like nearly perfect conjunction with the latest BINARLY🔬 disclosure, today we publish the 6th installment of our UEFI blog post series where we dissect 6 new vulnerabilities in HP's firmware that allow privilege escalation to SMM. sentinelone.com/labs/another-b… liba2k

Assaf Carlsbad (@assaf_carlsbad) 's Twitter Profile Photo

Yesterday liba2k and I presented our talk "Breaking Secure Boot with SMM" at Insomni'hack. The slides, exploit code, and some additional resources are now online and available here: github.com/liba2k/Insomni… Thanks to everyone who attended, we hope to see you all again next time!

Yesterday <a href="/liba2k/">liba2k</a> and I presented our talk "Breaking Secure Boot with SMM" at <a href="/1ns0mn1h4ck/">Insomni'hack</a>.
The slides, exploit code, and some additional resources are now online and available here: github.com/liba2k/Insomni…
Thanks to everyone who attended, we hope to see you all again next time!
liba2k (@liba2k) 's Twitter Profile Photo

A device that no one REALLY needs, but fun project anyway. Here is my Caliper/Digital indicator WiFi adapter. github.com/liba2k/VINCA_r…

Sipeed (@sipeedio) 's Twitter Profile Photo

New Tiny #tinyML #AIoT module M0S coming out~ Based on BL616, WiFi6+BT5.2+Zigbee, 384MHz #RISCV RV32GCP, 4MB Flash + 512KB SRAM, and USB2.0 HS in tiny 10x11mm stamp module! It would be <2$ ~

New Tiny #tinyML #AIoT module M0S coming out~ 
Based on BL616, WiFi6+BT5.2+Zigbee, 384MHz #RISCV RV32GCP, 4MB Flash + 512KB SRAM, and USB2.0 HS in tiny 10x11mm stamp module! 
It would be &lt;2$ ~
Brandon Dalton (@partyd0lphin) 's Twitter Profile Photo

Happy Friday everyone! Want a ProcMon for macOS? Ever wish you had your own Endpoint Security client you could task? Want to peer behind the macOS EDR curtain? Have a go and let us know what you think! github.com/redcanaryco/ma…

Caleb Fenton (@caleb_fenton) 's Twitter Profile Photo

If you like building platforms and infrastructure and want to get in on the ground floor of a cyber security startup doing AI and reverse engineering, DM me.

Delphos Labs (@delphoslabs) 's Twitter Profile Photo

Machine Learning Meets Malware. If cognition becomes an API call and malware can be reverse-engineered by an LLM, then what’s left of “zero trust”? Caleb Fenton joined Patrick McKenzie for a chat on AI, nation-states, and the new front in software security. 🎧complexsystemspodcast.com/episodes/machi…

liba2k (@liba2k) 's Twitter Profile Photo

At Delphos Labs, we're building tools to automate reverse engineering, no source code required. Help shape what we build next 👇 docs.google.com/forms/d/e/1FAI… It takes just a few minutes. Anonymous unless you opt in. Thanks for your input! 🙏

Caleb Fenton (@caleb_fenton) 's Twitter Profile Photo

Binary highlight: “Cyberpunk 7777 / QubePi” ELF. Text-menu game with hard-coded Postgres creds. Every login/chat/coord sent in clear on 5432—no TLS, no sanitization. Delphos auto-exposed the creds & flow in minutes. Sample: delphoslabs.com/uploads/26cc38… #ReverseEngineering

Binary highlight: “Cyberpunk 7777 / QubePi” ELF. Text-menu game with hard-coded Postgres creds. Every login/chat/coord sent in clear on 5432—no TLS, no sanitization. Delphos auto-exposed the creds &amp; flow in minutes.
Sample: delphoslabs.com/uploads/26cc38…
#ReverseEngineering
Delphos Labs (@delphoslabs) 's Twitter Profile Photo

XZ backdoor (liblzma.so.5.6.1) fully exposed in minutes with Delphos Labs. Black-box binaries? No more. Traditional tools would still be unpacking. That’s software, verified.