Mickey

7.1K posts

Mickey banner
Mickey

Mickey

@HackingThings

Low hanging fruit maven. Cluster Head. Tweets are my own. https://t.co/NsUyMzcogk

Below the operating system Katılım Nisan 2013
741 Takip Edilen7K Takipçiler
Mickey retweetledi
Joe Fitz
Joe Fitz@securelyfitz·
Hardware Hacking and AI* all using LLMs*: I've been teaching courses about *Attacking *IoT at Black Hat for over a decade - often using tools that include *Logic *Level *MOSFETs. Here's my take on some of the hardware courses and what pairs well for different skill levels:
English
1
8
62
6.8K
Mickey retweetledi
Mickey
Mickey@HackingThings·
Mickey tweet media
ZXX
0
0
2
439
Mickey retweetledi
impulsive
impulsive@weezerOSINT·
AMD is shipping a vulnerable kernel driver in the Razer Blade 16 BIOS updater. its sitting in the same folder as ANOTHER vulnerable driver that's been publicly known and documented as dangerous for years both are signed. both can be weaponized by malware to bypass your antivirus, take complete control of your computer from the inside, read anything stored in memory including passwords and crypto wallet keys, and load ransomware /Malware without your PC putting up a fight this is exactly what ransomware / malware operators and state backed groups hunt for every single day
impulsive tweet mediaimpulsive tweet media
English
11
76
559
76.4K
Mickey retweetledi
impulsive
impulsive@weezerOSINT·
GPU-Z is on basically every gaming PC on earth. TechPowerUp makes it. they also make Sapphire TRIXX. What I found is insane... both ship TRIXX.sys. IOCTL 0x800060C4 calls HalSetBusDataByOffset with user-controlled bus, device, function, and offset. any local process. no admin. reprogram any PCI BAR to any physical address. map it. arbitrary physical memory R/W from ring 3. a GPU info tool with the keys to your entire system. EV cert. valid through April 2028.
impulsive tweet mediaimpulsive tweet media
English
63
197
2.2K
336.3K
Mickey retweetledi
club1337
club1337@club31337·
Signed to Kill: Reverse Engineering a 0-Day Used to Disable #CrowdStrike EDR The article presents a reverse-engineering analysis of a kernel driver used in a BYOVD (Bring Your Own Vulnerable Driver) attack to disable security software, including @CrowdStrike Falcon EDR. The researcher discovered multiple variants of a Microsoft-signed driver that expose a dangerous IOCTL interface capable of terminating arbitrary processes. core-jmp.org/2026/04/signed…
English
0
43
168
11.5K
Mickey retweetledi
impulsive
impulsive@weezerOSINT·
github.com/magicsword-io/… found a 25KB WHQL signed driver from driverscloud.com. its a french hardware inventory tool people install to check what GPU they have. 7 IOCTLs, zero validation. no security descriptor on the device. FILE_ANY_ACCESS on every IOCTL. any user can open it. no admin needed. no UAC. unrestricted wrmsr. no whitelist. write IA32_LSTAR and every syscall on the system hits your code. the instruction takes single digit nanoseconds. arb physmem read up to 2MB per call, MSR read/write, port I/O, PCI config R/W. It wasn't on loldrivers. not on hvci blocklist. no CVE. 0/68 on VT
English
2
32
191
15.2K
Mickey retweetledi
MG
MG@_MG_·
Russia hid spy hardware in the walls of TechEx, an Ukraine defense company that builds drones. They don’t really explain what it is beyond “wire tap”, so let’s do a quick analysis on the hardware to configure out what it does! 🧵1
MG tweet mediaMG tweet media
English
8
174
1.3K
164.8K
Mickey retweetledi
Paul Asadoorian @paulasadoorian@infosec.exchange
We found 9 vulnerabilities across 4 low-cost IP-KVM vendors. These $30 devices give attackers the equivalent of physical access to everything they connect to. Below the OS, EDR, and pretty much every security control you've deployed.
Paul Asadoorian @paulasadoorian@infosec.exchange tweet media
English
16
55
279
32.9K
Mickey retweetledi
Daniel Cuthbert
Daniel Cuthbert@dcuthbert·
Everyone today is a hacker in a sense but there are very few OG hackers on which shoulders we stand Oh dude, Felix “FX” Lindner you were so much a hackers hacker and you will be missed RIP my friend and thank you
Daniel Cuthbert tweet media
English
51
135
580
79K
Mickey
Mickey@HackingThings·
Thank you for everything FX, you will be missed 😞
English
0
0
1
315
Mickey retweetledi
Travis Goodspeed
Travis Goodspeed@travisgoodspeed·
I'll be teaching a practical, introductory workshop on reverse engineering a mask ROM from a photo of a microchip at @BlueHatIL in Tel Aviv. If you're interested and in town, please join on either 10 or 11 March. You'll start with a microscope photo, end with disassembly code.
English
7
4
48
5.4K
Mickey retweetledi
Joe Fitz
Joe Fitz@securelyfitz·
I've got a brand new class in the works! Applied Physical Defenses: Secure Boot and Encrypted Firmware The first time I offer this class will be @BlackHatEvents in Singapore on April 21-22, more offerings coming soon. #applied-hardware-defences-secure-boot-and-encrypted-firmware-49814" target="_blank" rel="nofollow noopener">blackhat.com/asia-26/traini…
English
3
8
35
9.1K
Mickey
Mickey@HackingThings·
YubiKey Nano
Mickey tweet media
Filipino
1
2
6
647
Mickey
Mickey@HackingThings·
Doom on a webcam😂
Mickey tweet media
English
0
1
2
756