Tobias Scharnowski (@scepticctf) 's Twitter Profile
Tobias Scharnowski

@scepticctf

Embedded Firmware Fuzzing at fuzzware.io. Ph.D. student. Working on advancing embedded systems software security.

ID: 3184992317

calendar_today19-04-2015 23:08:11

143 Tweet

1,1K Takipçi

405 Takip Edilen

Tobias Scharnowski (@scepticctf) 's Twitter Profile Photo

Considering our unfortunate rolls I think it went as smoothly as we could have hoped for. Some uniques at attempts 5+ and all successes first try. Thank you Trend Zero Day Initiative for putting up the contest. I think this area is worth continued scrutiny. Hats off to @synacktiv, great work!

TyphoonCon🌪️ (@typhooncon) 's Twitter Profile Photo

📷We’re excited to announce the second training session for #TyphoonCon24: “Fuzzing & Attacking Deeply Embedded Devices” by Tobias Scharnowski (Tobias Scharnowski) & Marius Muench (nSinus-R (@[email protected])). Learn more and register: eventbrite.com/e/typhooncon-2…

📷We’re excited to announce the second training session for #TyphoonCon24: “Fuzzing &amp; Attacking Deeply Embedded Devices” by Tobias Scharnowski (<a href="/ScepticCtf/">Tobias Scharnowski</a>) &amp; Marius Muench (<a href="/nSinusR/">nSinus-R (@nsr@infosec.exchange)</a>).

Learn more and register: eventbrite.com/e/typhooncon-2…
nSinus-R (@nsr@infosec.exchange) (@nsinusr) 's Twitter Profile Photo

Interested in low-level hacking, embedded systems, and trusted execution environments? We currently have a PhD opening, feel free to reach out for more information! Application deadline: April 1st 2024.

ringzerø.training && @ringzer0@infosec.exchange (@_ringzer0) 's Twitter Profile Photo

Experts Tobias Scharnowski and nSinus-R (@[email protected]) teach how to analyze, fuzz test, and exploit deeply embedded devices that use custom embedded operating systems. Join them in Vegas this summer at Ringzer0's DOUBLEDOWN24: buff.ly/4ayAXME

Tobias Scharnowski (@scepticctf) 's Twitter Profile Photo

Our training on fuzzing custom firmware TyphoonCon🌪️ is coming up. This is a rare opportunity to learn about finding vulnerabilities in non-Linux firmware, which can be hard to get into. Get a chance to attend our training that was fully booked hardwear.io typhooncon.com/blog/conitems/…

Our training on fuzzing custom firmware <a href="/typhooncon/">TyphoonCon🌪️</a> is coming up. This is a rare opportunity to learn about finding vulnerabilities in non-Linux firmware, which can be hard to get into. Get a chance to attend our training that was fully booked <a href="/hardwear_io/">hardwear.io</a> typhooncon.com/blog/conitems/…
SinSinology (@sinsinology) 's Twitter Profile Photo

Tobias is SUUUUUUUPER skilled, if you are looking for a "one of a kind" course on fuzzing non-linux firmware fuzzing with things like unicornAFL, this is your guy 🔥

nSinus-R (@nsr@infosec.exchange) (@nsinusr) 's Twitter Profile Photo

We still have seats left in our upcoming TyphoonCon🌪️ training! Come and learn about emulation, rehosting and fuzzing with us. Fun fact: When creating this training, we accidentally discovered a new vulnerability (CVE-2023-48229). More infos and signup: typhooncon.com/blog/conitems/…

We still have seats left in our upcoming <a href="/typhooncon/">TyphoonCon🌪️</a> training! Come and learn about emulation, rehosting and fuzzing with us.

Fun fact: When creating this training, we accidentally discovered a new vulnerability (CVE-2023-48229). 

More infos and signup: typhooncon.com/blog/conitems/…
Thorsten Holz (@thorstenholz) 's Twitter Profile Photo

Our systemization of knowledge paper on „Prudent Evaluation Practices for Fuzzing“ (arxiv.org/abs/2405.10220) has received a Distinguished Paper award at IEEE #SP24 🎉

lcamtuf (@lcamtuf) 's Twitter Profile Photo

This is a fantastic meta-paper if you're writing a paper on a novel fuzzing technique: mschloegel.me/paper/schloege…

Kiddo (@kiddo_pwn) 's Twitter Profile Photo

What a COOL training, Isn't it? "Never gonna give you up" is started blasting from the exploited device! 😉🕺🏻 Mad props to Tobias Scharnowski & nSinus-R (@[email protected]) for delivering a training session on emulation, rehosting, and fuzzing at #TyphoonCon24 🌪 Their expertise is truly impressing. Had

Tobias Scharnowski (@scepticctf) 's Twitter Profile Photo

Training News: nSinus-R (@[email protected]) and I will give an online version of our embedded fuzzing training! Aug 19-24 with ringzerø.training && @[email protected]. Check out the details and book your slot here: ringzer0.training/doubledown24-f…

Training News: <a href="/nSinusR/">nSinus-R (@nsr@infosec.exchange)</a> and I will give an online version of our embedded fuzzing training! Aug 19-24 with <a href="/_ringzer0/">ringzerø.training && @ringzer0@infosec.exchange</a>.

Check out the details and book your slot here: ringzer0.training/doubledown24-f…
RE//verse (@reverseconf) 's Twitter Profile Photo

SIM cards: more than just storage. Join Marius Muench (@nsinusr) & Tomasz Lisowski as they reveal SIM vulnerabilities, baseband exploits, and turning SIM interposers into attack tools. Live demos & insights await! re-verse.sessionize.com/session/784666 #REverse2025 #BasebandHacking

SIM cards: more than just storage. Join Marius Muench (@nsinusr) &amp; Tomasz Lisowski as they reveal SIM vulnerabilities, baseband exploits, and turning SIM interposers into attack tools. Live demos &amp; insights await! re-verse.sessionize.com/session/784666 #REverse2025 #BasebandHacking
Tobias Scharnowski (@scepticctf) 's Twitter Profile Photo

This is the last chance to get our in-person training on fuzzing custom embedded systems (RTOS & bare metal) in Austin next month for the standard pricing (via the code RET2STD until next Tuesday). See you there :-)