Reverse Engineering & Customization of #Intel Microcode ( Pietro Borrello ) #offensivecon #informatique
Inside #Apple's Lightning : JTAGging the #iPhone for Fuzzing & Profit ( Stacksmashing
) #offensivecon #informatique
Advancements in #JavaScript Engine #Fuzzing ( Samuel Groß & Carl Smith ) #offensivecon #informatique
What's in a Name ? ( Mark Brand ) #offensivecon #informatique
Unearthing #Vulnerabilities in the #Apple Ecosystem : The Art of KidFuzzerV2.0
( Pan Zhenpeng ) #offensivecon #informatique
Embedded Threats : A Deep Dive into the Attack Surface & Security Implications of eSIM Technology( Markus Vervier ) #offensivecon #informatique
Your Mitigations Are My Opportunities ( Yarden Shafir ) #offensivecon #informatique
Changing & Unchanged Things in #Vulnerability Research ( Hao Xu ) #offensivecon #informatique
A Journey of Exploiting #ASN.1 Parsers in the Baseband ( Amat Cama ) #offensivecon #informatique
A Dark Side of #UEFI : Cross-Silicon Exploitation ( Alex Matrosov & Alex Ermolov ) #offensivecon #informatique
Attacking the #Linux Kernel ( Alex Plaskett & Cedric Halbronn ) #offensivecon #informatique
Auditing & Exploiting #XNU Virtual Memory ( Ian Beer ) #offensivecon #informatique
Exploiting Spinlock #UAF in the #Android Kernel ( Moshe Kol ) #offensivecon #informatique
New #Phones, #Software & Chips = New Bugs? ( Martijn Bogaard ) #offensivecon #informatique
The Print Spooler Bug that Wasn't in the Print Spooler ( Maddie Stone & James Forshaw ) #offensivecon #informatique
Abusing #Linux In-Kernel SMB Server to Gain Kernel RCE ( Guillaume Teissier & Quentin Minster ) #offensivecon #informatique
Information Security is an #ecology of horrors and you are the solution ( Dave Aitel ) #offensivecon #informatique
« Solar Superstorms : Planning for an Internet Apocalypse » #solar #threats [ https://www.ics.uci.edu/~sabdujyo/papers/sigcomm21-cme.pdf ] #informatique
« Keepass triggers are dead, long live Keepass triggers! » by Julien Bedel
This article demonstrates how a combination of KeePass triggers, placeholders and field references can be used to export databases by simply editing the configuration file. #keepass #software #informatique
ClickOnce « Based on all that was covered, we see ClickOnce as one of the best opportunities for initial access. » #threats [ https://posts.specterops.io/less-smartscreen-more-caffeine-ab-using-clickonce-for-trusted-code-execution-1446ea8051c5?gi=8d2cfa8260f3 ] #informatique
Hello, I'm chirp, your virtual parrot.
Just another node. feedback loop?