Gabriel Gonzalez

2.6K posts

Gabriel Gonzalez

Gabriel Gonzalez

@GabrielGonzalez

https://t.co/EJcsZWyUMW

Madrid Katılım Nisan 2008
317 Takip Edilen1.1K Takipçiler
Gabriel Gonzalez retweetledi
IOActive, Inc
IOActive, Inc@IOActive·
ICYMI: Check out this research from IOActive Security Consultant Carlos Gomez Quintana, where he identified a critical attack vector for multi-factor authentication (MFA). ioactive.com/authentication…
English
0
2
3
229
Gabriel Gonzalez retweetledi
IOActive, Inc
IOActive, Inc@IOActive·
Gabriel Gonzalez, IOA Director of Hardware Security, recently wrote an op-ed for @thesignforyou. “... modern SATCOM systems resemble under-secured enterprise networks – except their failure modes carry national, economic, & physical consequences.” thesign.media/blog/satcom-ne…
English
0
4
5
250
Gabriel Gonzalez
Gabriel Gonzalez@GabrielGonzalez·
I have more control and information available : D With the commands below, it prints strings (and symbols if it’s a structured executable): r2 -qq -e scr.color=0 -c "iz;is" or -c "izz" for raw binaries
English
0
0
0
73
Gabriel Gonzalez
Gabriel Gonzalez@GabrielGonzalez·
For years I have relied on our dear strings command to get a quick sense of an embedded firmware or executable before I begin #reverse #engineering. But lately, I’ve found it much more convenient to use #radare2 for this task!
Gabriel Gonzalez tweet media
English
1
1
7
1.1K
Gabriel Gonzalez
Gabriel Gonzalez@GabrielGonzalez·
and the next value the address where the code the processor needs to start executing after reset. This area is very important because it can be very useful when rebasing a firmware or, for example, finding the SVC entry point.
English
0
0
1
41
Gabriel Gonzalez
Gabriel Gonzalez@GabrielGonzalez·
What are those values we often see at the beginning of a firmware binary while we are performing #reverse #engineering? That's the vector table and is used by the chip to begin the execution of the software. In ARM it usually contains the stack pointer [...]
Gabriel Gonzalez tweet media
English
1
0
2
161
Gabriel Gonzalez
Gabriel Gonzalez@GabrielGonzalez·
@rce_trent Thanks for using the book! I hope you can learn and practice something new : ) yeah, the first example is for people who is new to U-Boot to see how an unprotected device looks like
English
0
0
0
15
rce_trent
rce_trent@rce_trent·
@GabrielGonzalez hey going through this book, nice work. the example in #1 is broken though, there is no script to prevent just putting in boot.
rce_trent tweet media
English
1
0
0
51
Gabriel Gonzalez
Gabriel Gonzalez@GabrielGonzalez·
I have finally release my book on Attacking and Securing U-Boot! The goal is to provide a *hands-on* approach to the bootloader via a VM that includes practical examples so any security consultant or embedded developer. amazon.com/dp/B0DJ7M2JNN
English
4
95
239
20.5K
Gabriel Gonzalez retweetledi
IOActive, Inc
IOActive, Inc@IOActive·
How did @GabrielGonzalez and our team of researchers crack a Bitcoin ATM? The trick was getting our custom QR code to appear on the ATM's terminal. Check out the full video explanation along with the research findings in this blog! ioactive.com/owning-a-bitco…
English
0
1
2
244
Gabriel Gonzalez
Gabriel Gonzalez@GabrielGonzalez·
I have found that some people tend to underestimate the compounded risk when vulnerabilities are presented individually. One good example is our research on the Bitcoin ATM, where we chained two vulns to get full control: ioactive.com/owning-a-bitco…
English
0
1
3
247
Gabriel Gonzalez retweetledi
IOActive, Inc
IOActive, Inc@IOActive·
Have you ever seen a Bitcoin ATM be jackpotted? While we can't share the payload, check out this preview of the results of our research where we got a Bitcoin ATM to spit cash. Check out the full video & related research at the following link! ioactive.com/owning-a-bitco…
English
0
2
1
688
Gabriel Gonzalez retweetledi
IOActive, Inc
IOActive, Inc@IOActive·
Check out this preview of how IOActive’s Director of Hardware, Gabriel Gonzalez, got a Bitcoin ATM to spit out cash by exploiting a vulnerability. You can see the full video and the research associated by checking out the following link! ioactive.com/owning-a-bitco…
English
0
2
3
943
Gabriel Gonzalez retweetledi
Tierra de Hackers
Tierra de Hackers@tierradehackers·
¿Cómo se podría hackear la red eléctrica española? ¿Qué es una red OT? ¿Qué herramientas existen para auditar sistemas industriales? Para contestar a estas y más preguntas, nos acompaña @GabrielGonzalez , Director de Hardware Hacking en IOActive. youtube.com/watch?v=GzNZ1R…
YouTube video
YouTube
Tierra de Hackers tweet media
Español
0
3
8
1.9K
Gabriel Gonzalez retweetledi
IOActive, Inc
IOActive, Inc@IOActive·
REMINDER: We have our IOA Lab's Summer BBQ coming up at the end of the month, taking place at our Seattle Hardware Lab. Learn how our advanced equipment can accomplish amazing feats! Request your invite today! Spots are limited. info.ioactive.com/acton/fs/block…
IOActive, Inc tweet media
English
0
1
0
258