Attacking the Linux PRNG on Android & Embedded Devices
#binary
#exploitation
#linux
#android
#prng
———
🆔 @Infosec_Fortress
#binary
#exploitation
#linux
#android
#prng
———
🆔 @Infosec_Fortress
👍1
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical
#hardware
#CPU
———
🆔 @Infosec_Fortress
#hardware
#CPU
———
🆔 @Infosec_Fortress
Infosec Fortress
sec21-paccagnella.pdf
YouTube
USENIX Security '21 - Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring...
USENIX Security '21 - Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical
Riccardo Paccagnella, Licheng Luo, and Christopher W. Fletcher, University of Illinois at Urbana-Champaign
We introduce the first microarchitectural…
Riccardo Paccagnella, Licheng Luo, and Christopher W. Fletcher, University of Illinois at Urbana-Champaign
We introduce the first microarchitectural…
Forwarded from Cafe Security (Mohammad)
REVISED_US24-Gong-The-Way-to-Android-Root-Wednesday.pdf
1.5 MB
🔥1
Ret2System - 35C3 - The Layman's Guide to Zero-Day Engineering
Video
#exploitation
#0day
#guide
#conference
———
🆔 @Infosec_Fortress
Video
#exploitation
#0day
#guide
#conference
———
🆔 @Infosec_Fortress
YouTube
35C3 - The Layman's Guide to Zero-Day Engineering
https://media.ccc.de/v/35c3-9979-the_layman_s_guide_to_zero-day_engineering
A demystification of the exploit development lifecycle
There's a certain allure to zero-day exploits. At the apex of the security industry, these elusive technologies are engineered…
A demystification of the exploit development lifecycle
There's a certain allure to zero-day exploits. At the apex of the security industry, these elusive technologies are engineered…
👍2
Infosec Fortress
Hey everybody. I added a new feature to my IDA plugin (CBS). Now it's able to switch breakpoints between enabled and disabled ones. Also, you can remove breakpoints. https://github.com/Reodus/CBS Note: The plugin is written in Python and should be enabled…
This media is not supported in your browser
VIEW IN TELEGRAM
Hello again! I’m excited to announce a new feature in the plugin: it now supports regex-based searches. This means you can find instructions not just by their mnemonics, but also by using powerful regular expressions for more precise and flexible matching.
The repository link
#projects
———
🆔 @Infosec_Fortress
The repository link
#projects
———
🆔 @Infosec_Fortress
👍3🔥1
DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101
Video
#vulnerability
#research
#vr
#conference
———
🆔 @Infosec_Fortress
Video
#vulnerability
#research
#vr
#conference
———
🆔 @Infosec_Fortress
YouTube
DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101
If you’re interested in vulnerability research for fun or profit, or if you’re a beginner and you’re not sure how to progress, it can be difficult to sift through the firehose of technical information that’s out there. Plus there are all sorts of non-technical…
🔥1
Forwarded from Cafe Security (Mohammad)
us-20-Demirkapi-Demystifying-Modern-Windows-Rootkits (1).pdf
530.7 KB
🔥1