@defparam@infosec.exchange
For example, the term "privilege" is used by the NSA in the context of "privilege escalation," which is a counterintelligence technique
to continue the tradition, here is some of my favorite firmware & embedded security research of 2024:
Defeating the new Raspberry Pi's RP2350 Security Features [1]
Reversing and Hacking Firmware of an in-orbit Satellite to Re-establish Lost Communication [2]
to continue the tradition, here is some of my favorite firmware & embedded security research of 2024:
Defeating the new Raspberry Pi's RP2350 Security Features [1]
Reversing and Hacking Firmware of an in-orbit Satellite to Re-establish Lost Communication [2]
media.ccc.de/b/congress/2...
#cybersecurity #informationsecurity #hacking #exploitation #iOS #android #apple #exploitation #reverseengineering #vulnerability
media.ccc.de/b/congress/2...
#cybersecurity #informationsecurity #hacking #exploitation #iOS #android #apple #exploitation #reverseengineering #vulnerability
The first puzzle comes out in two hours: adventofcode.com
The first puzzle comes out in two hours: adventofcode.com
I love it as a vehicle to play with a new programming language or two, or dust the cobwebs off an old one. I solved the first day's challenge with PHP!
The first puzzle comes out in two hours: adventofcode.com
I love it as a vehicle to play with a new programming language or two, or dust the cobwebs off an old one. I solved the first day's challenge with PHP!
I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.
naehrdine.blogspot.com/2024/11/reve...
I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.
naehrdine.blogspot.com/2024/11/reve...
github.com/0xdea/weggli...
security.humanativaspa.it/a-collection...
github.com/0xdea/weggli...
security.humanativaspa.it/a-collection...
youtu.be/kfuOzDwv874
youtu.be/kfuOzDwv874