Gwaby (@pwissenlit) 's Twitter Profile
Gwaby

@pwissenlit

Sick sad world & caramel

ID: 2919429759

calendar_today13-12-2014 11:25:45

416 Tweet

1,1K Followers

149 Following

quarkslab (@quarkslab) 's Twitter Profile Photo

Exploitation of UEFI bugs is a rarely discussed topic. In this blog post Gwaby shows how she leveraged a boring UEFI bug in the Tianocore's EDK2 implementation to develop a cool exploitation technique. For science! #UEFI #vulnresearch #exploit blog.quarkslab.com/for-science-us…

Exploitation of UEFI bugs is a rarely discussed topic.
In this blog post <a href="/pwissenlit/">Gwaby</a> shows how she leveraged a  boring UEFI bug in the Tianocore's EDK2 implementation to develop a cool exploitation technique. For science!
#UEFI #vulnresearch #exploit 
blog.quarkslab.com/for-science-us…
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent blog post about exploiting EDK II (UEFI public implementation) Credits Gwaby (quarkslab) blog.quarkslab.com/for-science-us… #uefi #cybersecurity

Excellent blog post about exploiting EDK II (UEFI public implementation)
Credits <a href="/pwissenlit/">Gwaby</a> (<a href="/quarkslab/">quarkslab</a>)

blog.quarkslab.com/for-science-us…

#uefi #cybersecurity
quarkslab (@quarkslab) 's Twitter Profile Photo

Reversing Windows Container, episode I: Silo An exploration of the depths of #Windows #container technology by Quarkslab's engineer Lucas di Martino #docker #hyperv #reversing blog.quarkslab.com/reversing-wind…

Reversing Windows Container, episode I: Silo
An exploration of the depths of #Windows #container technology by Quarkslab's engineer Lucas di Martino
#docker #hyperv #reversing
blog.quarkslab.com/reversing-wind…
quarkslab (@quarkslab) 's Twitter Profile Photo

Is remote code execution in UEFI firmware possible? Yes it is. Meet #PixieFAIL: 9 vulnerabilities in the IPv6 stack of EDK II, the open source UEFI implementation used by billions of computers. Full details by Francisco Falcon and iarce in our new blog post: blog.quarkslab.com/pixiefail-nine…

Is remote code execution in UEFI firmware possible?
Yes it is. 
Meet #PixieFAIL: 9 vulnerabilities in the IPv6 stack of EDK II, the open source UEFI implementation used by billions of computers.
Full details by <a href="/fdfalcon/">Francisco Falcon</a> and <a href="/4Dgifts/">iarce</a> in our new blog post:
blog.quarkslab.com/pixiefail-nine…
BINARLY🔬 (@binarly_io) 's Twitter Profile Photo

💥#LogoFAIL Redux: The Binarly REsearch team creates PoC to show how fuzzing crashes of firmware image parsers can be leveraged by attackers to achieve arbitrary code execution with firmware privileges during the boot process (OS -> FW). 🔬More details: binarly.io/posts/inside_t…

💥#LogoFAIL Redux: The Binarly REsearch team creates PoC to show how fuzzing crashes of firmware image parsers can be leveraged by attackers to achieve arbitrary code execution with firmware privileges during the boot process (OS -&gt; FW).

🔬More details: binarly.io/posts/inside_t…
Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Intel Hardware Shield deep dive: part 1 is user-mode System Management Mode (ISRD). tandasat.github.io/blog/2024/02/2… ISRD is beautifully architected, and I have enjoyed studying it a lot. Excellent work by Intel.

Intel Hardware Shield deep dive: part 1 is user-mode System Management Mode (ISRD).
tandasat.github.io/blog/2024/02/2…

ISRD is beautifully architected, and I have enjoyed studying it a lot. Excellent work by Intel.
quarkslab (@quarkslab) 's Twitter Profile Photo

Interested in navigation of source code, binaries and other artifacts? Let a marsupial and goddess help you. Here Eloïse Brocas and Fenrisfulsur introduce Numbat, a new Python API for Sourcetrail, and Pyrrha, a mapper collection for firmware cartography. blog.quarkslab.com/leveraging-sou…

Interested in navigation of source code, binaries and other artifacts? Let a marsupial and goddess help you.
Here <a href="/_cryptocorn_/">Eloïse Brocas</a> and Fenrisfulsur introduce
Numbat, a new Python API for Sourcetrail, and Pyrrha, a mapper collection for firmware cartography.
blog.quarkslab.com/leveraging-sou…
Maxime Rossi Bellom (@max_r_b) 's Twitter Profile Photo

Better late than never! The slides of our talk "Attacking Samsung Galaxy A* Boot Chain" at offensivecon can be found here: github.com/quarkslab/conf… The video is also available: youtube.com/watch?v=WJ7wkJ…

quarkslab (@quarkslab) 's Twitter Profile Photo

Finding and chaining 4 vulns to exfiltrate encryption keys from the Android Keystore on Samsung series A* devices. Did you miss the "Attacking the Samsung Galaxy A* Boot Chain" talk by Maxime Rossi Bellom and Raphaël Neveu earlier this year ? Talk && PoC || GTFO: blog.quarkslab.com/attacking-the-…

Finding and chaining 4 vulns to exfiltrate encryption keys from the Android Keystore on Samsung series A* devices.
Did you miss the  "Attacking the Samsung Galaxy A* Boot Chain" talk by <a href="/max_r_b/">Maxime Rossi Bellom</a> and Raphaël Neveu earlier this year ? 
Talk &amp;&amp; PoC  || GTFO:
blog.quarkslab.com/attacking-the-…
quarkslab (@quarkslab) 's Twitter Profile Photo

Good tools are made of bugs: How to monitor your Steam Deck with one byte. Finding and exploiting two vulnerabilities in AMD's UEFI firmware for fun and gaming . A Christmas gift in February, brought to you by the amazing Gwaby 🫶 blog.quarkslab.com/being-overlord…

Good tools are made of bugs: How to monitor your Steam Deck with one byte.
Finding and exploiting two vulnerabilities in  AMD's UEFI firmware for fun and gaming . 
A Christmas gift in February, brought to you by the amazing <a href="/pwissenlit/">Gwaby</a>  🫶

blog.quarkslab.com/being-overlord…
quarkslab (@quarkslab) 's Twitter Profile Photo

AMD published Security Bulletin AMD-SB-7027 addressing CVE-2024-0179 and CVE-2024-21925, the two UEFI SMM vulnerabilities disclosed in our blog post. Data center, desktop, mobile and embedded processors products are affected: amd.com/en/resources/p…