ash
repne.bsky.social
ash
@repne.bsky.social
Currently focused on Red Teaming/Adversarial Simulation @ Google. Previously App Sec, Malware RE and Threat Intel. I also like video games and general tech.
This esp32 "bluetooth backdoor" doesn't sound very different from what @naehrdine.bsky.social + crew found in bcm43xx to develop github.com/seemoo-lab/i...
March 9, 2025 at 1:16 AM
A watched fuzzer never boils...
March 6, 2025 at 3:50 AM
Reposted by ash
I got Linux running in a PDF file using a RISC-V emulator.

PDFs support Javascript, so Emscripten is used to compile the TinyEMU emulator to asm.js, which runs in the PDF. It boots in about 30 seconds and emulates a riscv32 buildroot system.

linux.doompdf.dev/linux.pdf
github.com/ading2210/li...
January 31, 2025 at 8:02 PM
Reposted by ash
Positive Technologies has developed a new attack that exploits the SD Express standard to gain access to a device's memory through its SD card reader

The DaMAgeCard attack exploits the fact that the new SD Express standard can operate in both SDIO and NVMe

swarm.ptsecurity.com/new-dog-old-...
December 8, 2024 at 11:11 AM
Reposted by ash
I should write a bittorrent client
November 30, 2024 at 7:26 AM
Reposted by ash
November 25, 2024 at 2:51 PM
Reposted by ash
How does the new iOS inactivity reboot work? What does it protect from?

I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.

naehrdine.blogspot.com/2024/11/reve...
Reverse Engineering iOS 18 Inactivity Reboot
Wireless and firmware hacking, PhD life, Technology
naehrdine.blogspot.com
November 17, 2024 at 9:42 PM
Looking at this list of 2023 routinely exploited issues It's always interesting to look at the split between memory safety issues and bug classes. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a
November 15, 2024 at 3:42 AM
November 14, 2024 at 6:32 AM
Anyone got a sample?
Here's why Adam thinks a Linux malware variant that recently turned up in Russia was probably developed by Western SIGINT. More details in this week's Risky Business podcast, available on YouTube (www.youtube.com/watch?v=s7iP...) or wherever you get your audio podcasts...
November 14, 2024 at 12:56 AM
Reposted by ash
Talks from the Hexacon 2024 security conference, which took place earlier this month, are available on YouTube

www.youtube.com/playlist?lis...
HEXACON 2024 - YouTube
www.youtube.com
November 10, 2024 at 12:00 PM
November 11, 2024 at 4:57 AM
Reposted by ash
You can do some magical things with paths on Windows. If you haven’t seen it before JonasLyk’s work on “webdav based reflective loader/per process devicemap based dll injector POC” is a work
of art. Search his handle + webdav on X for some commentary
github.com/jonaslyk/tem...
github.com
November 11, 2024 at 2:28 AM
New here but I'm feeling optimistic that this might actually replace what infosec twitter used to be
November 11, 2024 at 3:37 AM