sukelluskello
sukelluskello.bsky.social
sukelluskello
@sukelluskello.bsky.social
High and low, both ends need to balance.

sukelluskello.bsky.social
HäjySec, anyone? I am speaking at HäjySec March Meetup on ”So how do you know if you are lied to?”.
March 5, 2025 at 6:29 AM
January 25, 2025 at 5:30 PM
January 21, 2025 at 5:19 PM
@helsec.bsky.social HelSec Ry seeks for volunteers! Get involved, you familiar and new faces. Fill in the form here: docs.google.com/forms/d/e/1F...
January 18, 2025 at 1:28 PM
Reposted by sukelluskello
A plea to the cryptography community: let's please all agree to use seeds as ML-KEM keys.

Seeds are generally preferable to expanded keys because they are smaller and don't require validation. Having one key format is VASTLY preferable to having two.
Let’s All Agree to Use Seeds as ML-KEM Keys
ML-KEM private key seeds are vastly preferable to expanded decapsulation keys as a storage format. A plea to standardize on them.
words.filippo.io
August 21, 2024 at 2:51 PM
Reposted by sukelluskello
Interesting white paper (2022) on attacking cars wireless exposed communication (Tesla Model Y, NFC and Proxmark)

White paper link: act-on.ioactive.com/acton/attach...

#automotive #cybersecurity
March 2, 2024 at 10:36 AM
Reposted by sukelluskello

Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3

web.archive.org/web/20230522...

#reverseengineering #infosec
March 3, 2024 at 10:27 AM
Reposted by sukelluskello
Excellent CTF challenges writeups for learning the msg_msg technique for arbitrary read and write for Linux kernel exploitation

syst3mfailure.io/wall-of-perd...
willsroot.io/2021/08/corc...

#Linux #cybersecurity
March 1, 2024 at 8:57 AM
Reposted by sukelluskello
Excellent introduction guide to ARM TrustZone and embedded systems security

embeddedsecurity.io

#trustzone #infosec
February 21, 2024 at 9:25 AM
Reposted by sukelluskello
Reverse engineering and analysis to the Sonos One speaker (HITB 2023 presentation)

conference.hitb.org/files/hitbse...

#sonos #cybersecurity
February 22, 2024 at 8:28 AM
Reposted by sukelluskello
Great series for learning ELF file format internals

Part 1: intezer.com/blog/researc...
Part 2: intezer.com/blog/malware...
Part 3: intezer.com/blog/malware...
Part 4: intezer.com/blog/malware...

#elf #cybersecurity
February 23, 2024 at 8:24 AM
Reposted by sukelluskello
Interesting reading on Windows kernel vulnerable drivers and how to identify them

blogs.vmware.com/security/202...

#cybersecurity #Windows
February 14, 2024 at 11:01 AM
Reposted by sukelluskello
Beginners series for starting with embedded devices reverse engineering

Ghidra setup: voidstarsec.com/blog/ghidra-...

Tools: voidstarsec.com/blog/intro-t...

Firmware extraction: voidstarsec.com/blog/uart-ub...

#reverseengineering #cybersecurity
February 13, 2024 at 11:01 AM
Reposted by sukelluskello
February 11, 2024 at 10:14 AM
Reposted by sukelluskello
Excellent overview of glibc heap exploitation techniques

0x434b.dev/overview-of-...

#glibc #cybersecurity
February 8, 2024 at 8:25 AM
Reposted by sukelluskello
Series on "Reverse Engineering Dark Souls 3 Networking"

1. Connection: timleonard.uk/2022/05/29/r...

2. Packets: timleonard.uk/2022/06/02/r...

3. Key exchange: timleonard.uk/2022/06/03/r...

4. Reliable UDP: timleonard.uk/2022/06/09/r...

#networking #reverseengineering
January 29, 2024 at 9:20 AM