R0 CREW (@r0_crew) 's Twitter Profile
R0 CREW

@r0_crew

A community of low-level information security researchers.

ID: 161401871

linkhttps://forum.reverse4you.org calendar_today30-06-2010 19:17:39

4,4K Tweet

5,5K Followers

291 Following

Maxim Goryachy (@h0t_max) 's Twitter Profile Photo

Today we're[+Mark Ermolov and Dmitry Sklyarov]disclosing the technique allowing to modify #Intel #Microcode on the fly! For the first time you have the ability to intercept control flow at such a low level. We've developed the microcode patch that changes the processor model string as PoC

Mark Ermolov (@_markel___) 's Twitter Profile Photo

Wow, we (+Maxim Goryachy and Dmitry Sklyarov) have found two undocumented x86 instructions in Intel CPUs which completely control microarchitectural state (yes, they can modify microcode)

Wow, we (+<a href="/h0t_max/">Maxim Goryachy</a> and <a href="/_Dmit/">Dmitry Sklyarov</a>) have found two undocumented x86 instructions in Intel CPUs which completely control microarchitectural state (yes, they can modify microcode)
Man Yue Mo (@mmolgtm) 's Twitter Profile Photo

In the last part of the Chrome beta + Android full chain series, I'll use a Chrome WebAudio UAF I reported last September (which turned out to be a bug collision) to gain RCE in the renderer sandbox. securitylab.github.com/research/one_d…

Maxim Goryachy (@h0t_max) 's Twitter Profile Photo

[1/4]People ask us (+Dmitry Sklyarov and Mark Ermolov) for details about undocumented crbus instructions. We recorded the demo showing that for access to crbus requires only execute arbitrary code with root/admin privilege. (details below)

PT SWARM (@ptswarm) 's Twitter Profile Photo

New article "How we bypassed bytenode and decompiled Node.js (V8) bytecode in Ghidra" by our researcher Sergey Fedonin. swarm.ptsecurity.com/how-we-bypasse…

New article "How we bypassed bytenode and decompiled Node.js (V8) bytecode in Ghidra" by our researcher Sergey Fedonin.

swarm.ptsecurity.com/how-we-bypasse…
Maxim Goryachy (@h0t_max) 's Twitter Profile Photo

Finally, we've published the results of our three-year research of Intel Microcode, using it now you can earn up to $150,000.

Serhii Khariuk 🇺🇦 (@ximerus) 's Twitter Profile Photo

Hey man, you want some money? Join awesome #CTF by the #CyberUnit company and my friend Yegor Aushev, which will go online as a part of the @GISECDUBAI conference. Don't lose the opportunity to defeat #blueteam and make some money! Join on: thehunt.cyberunit.ae

ZeroNights (@zeronights) 's Twitter Profile Photo

r0 Crew supports #ZeroNights2021! It is a community of information security researchers. The main goal of the community is to create an environment for meetings, communication, and exchange.

r0 Crew supports #ZeroNights2021!

It is a community of information security researchers. The main goal of the community is to create an environment for meetings, communication, and exchange.
b33f | 🇺🇦✊ (@fuzzysec) 's Twitter Profile Photo

Pssst, Ghidra 10.0 is out => github.com/NationalSecuri… There is debugger support now which is great, that will definitely bridge a usability gap 🧙‍♂️🌶️

Pssst, Ghidra 10.0 is out =&gt; github.com/NationalSecuri… There is debugger support now which is great, that will definitely bridge a usability gap 🧙‍♂️🌶️
R0 CREW (@r0_crew) 's Twitter Profile Photo

[LEAKED] IDA Pro 7.6 SP1 + HexRays (x86/x64/ARM/ARM64/MIPS) Some guy "gogogo" came to our telegram (t.me/r0_chat) chat and leaked IDA Pro 7.6 SP1. forum.reverse4you.org/t/leaked-ida-p… #idapro #ida #leaked #decompilers

Maxim Goryachy (@h0t_max) 's Twitter Profile Photo

Finally after our public talks and papers about DCI Intel officially admitted that CPU and PCH has "per-part “password” into the product through the debug interface (i.e., JTAG, I3C, USB) which is used to authenticate (and unlock)."

Finally after our public talks and papers about DCI Intel officially admitted that CPU and PCH has "per-part “password” into the product through the debug interface (i.e., JTAG, I3C, USB) which is used to authenticate (and unlock)."
Maxim Goryachy (@h0t_max) 's Twitter Profile Photo

The ELF-file inside microcode update, Intel Atom uCode format and etc. Details in slides from our ZeroNights 2021 talk "Chip Red Pill: How we achieved to execute arbitrary [micro]code inside Intel Atom CPUs". github.com/chip-red-pill/…

The ELF-file inside microcode update, Intel Atom uCode format and etc. Details in slides from our <a href="/ZeroNights/">ZeroNights</a> 2021 talk "Chip Red Pill: How we achieved to execute arbitrary [micro]code inside Intel Atom CPUs". github.com/chip-red-pill/…
Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

Our congratulations to the winners of Hex-Rays Plugin Contest 2021!🎉🎁🎆 🥇 Tenet by 🥈 D-810 by Boris Batteux, eShard 🥉 nmips by Leonardo Galli With many excellent entries selecting just three was a real challenge. Take a look yourself: hex-rays.com/contests_detai…

Our congratulations to the winners of Hex-Rays Plugin Contest 2021!🎉🎁🎆

🥇 Tenet by <a href="/gaasedelen/"></a>

🥈 D-810 by Boris Batteux, eShard

🥉 nmips by <a href="/galli_leo_/">Leonardo Galli</a>

With many excellent entries selecting just three was a real challenge. Take a look yourself: hex-rays.com/contests_detai…
OFFZONE (@offzone_moscow) 's Twitter Profile Photo

🔥OFFZONE 2022 to be held in summer Hi there. It's been quite a while, but now we're back with good news: the next #OFFZONE will take place on August 25–26, 2022. Follow us and stay tuned :) offzone.moscow

🔥OFFZONE 2022 to be held in summer
Hi there. It's been quite a while, but now we're back with good news: the next #OFFZONE will take place on August 25–26, 2022.
Follow us and stay tuned :) 
offzone.moscow
R0 CREW (@r0_crew) 's Twitter Profile Photo

IDA PRO 7.7 SP1 LEAKED AGAIN! For more info check out our chat: t.me/r0_chat #idapro #ida #leaked #tools #reverse #decompilers

OFFZONE (@offzone_moscow) 's Twitter Profile Photo

OFFZONE 2022, August 25–26 Early bird tickets are now on sale: - ₽8,500 individual rate - ₽13,500 corporate rate - ₽4,500 for holders of student IDs - +₽7,000 admission to the Speaker Party Your OFFZONE 2020 ticket is still valid. Buy tickets bit.ly/3vaZpBh

OFFZONE 2022, August 25–26

Early bird tickets are now on sale:
- ₽8,500 individual rate
- ₽13,500 corporate rate
- ₽4,500 for holders of student IDs
- +₽7,000 admission to the Speaker Party
Your OFFZONE 2020 ticket is still valid.

Buy tickets bit.ly/3vaZpBh