Iskuri

835 posts

Iskuri banner
Iskuri

Iskuri

@Iskuri1

Katılım Temmuz 2018
476 Takip Edilen966 Takipçiler
Iskuri
Iskuri@Iskuri1·
Extremely excited to announce that I will be speaking at @BlackHatEvents #BHAsia this year, with my talk surrounding exploitation of smartphone Boot ROMs, and what can be achieved on a target by compromising the boot chain! #practical-attacks-against-smartphone-boot-roms-50532" target="_blank" rel="nofollow noopener">blackhat.com/asia-26/briefi…
English
0
4
29
4.7K
stacksmashing
stacksmashing@ghidraninja·
When I got started with hardware hacking etc @travisgoodspeed was (and is) one of my heroes. Now there’s a chapter in his new (awesome) book on a vuln I found. Feels awesome. Thanks Travis for all your contributions to our community. Also, you should buy his book!
stacksmashing tweet mediastacksmashing tweet media
English
7
46
490
21.9K
Iskuri
Iskuri@Iskuri1·
@travisgoodspeed Can't go wrong with a Kingst LA1010 if you want something low price with decent software.
English
0
0
3
694
Travis Goodspeed
Travis Goodspeed@travisgoodspeed·
A friend needs a cheap logic analyzer and won't invest in a quality one. What are the cool kids using instead of Sigrok these days? (Open or closed, must reliably decode UART traffic on at least two channels at 115200.)
English
34
12
73
26.9K
Iskuri retweetledi
is-eqv.bsky.social
is-eqv.bsky.social@is_eqv·
PSA: If you do fuzzing research, don't even bother trying to beat AFL++. Just start your evaluation when the ensemble of other existing fuzzers has thoroughly plateaued (I.e. 100h+). Go find problems that can't be solved rn. Don't try to get another 1% gain in the first 48h.
English
5
15
87
16.7K
Iskuri
Iskuri@Iskuri1·
@travisgoodspeed I believe this mechanism was also vulnerable to TOCTOU on the original Gameboy, you could display a custom logo if you altered the memory on the cartridge after the first comparison.
English
0
0
3
151
Travis Goodspeed
Travis Goodspeed@travisgoodspeed·
The Game Boy copy protection is just that the trademarked Nintendo logo must appear at 0x104 in the cartridge memory. There's no copy protection chip like the NES, SNES and N64. Is there a list of unlicensed games somewhere, or were these counterfeits of licensed games?
Supper Mario Broth@MarioBrothBlog

In 1994, Nintendo made a public event at a Dutch airport where 10,000 counterfeit Game Boy games they confiscated in the Netherlands were ran over by a steamroller, to send a message to counterfeiters. An actor in a Mario costume was overseeing the operation.

English
5
7
28
7.7K
Iskuri retweetledi
Andrey Konovalov
Andrey Konovalov@andreyknvl·
Wrote an article about turning a ThinkPad X1 Carbon 6th Gen laptop into a programmable USB device by enabling the xDCI controller 😯 Now I can emulate USB devices from the laptop without external hardware, including via Raw Gadget or even Facedancer 😁 xairy.io/articles/think…
English
8
178
598
53.6K
Iskuri retweetledi
CVE
CVE@CVEnew·
CVE-2024-22012 In TBD of TBD, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution pr… cve.org/CVERecord?id=C…
English
0
1
3
1.4K
Iskuri
Iskuri@Iskuri1·
@herrmann1001 Sadly, this attack is a couple of years old, but was still a fun exercise at the time!
English
0
0
1
81
Iskuri
Iskuri@Iskuri1·
Also, here is my exploit for the PN553, an NFC chip from a series which was found an insane number of phones at the time of analysis: github.com/Iskuri/PN553-S… this version purely dumps the BootROM from the chip, and could be adapted to most non-updated PN series chips.
English
4
56
122
17.6K
Iskuri
Iskuri@Iskuri1·
@olemoudi Great points, thanks for summarising! The only thing I would add is that devices are still vulnerable to cold boot attacks (RAM dump on reboot) if you compromise the bootloader, even if it isn't unlocked, so there is still some risk of forensic attacks.
English
0
0
1
27
Martín Obiols
Martín Obiols@olemoudi·
8- Despite all of the above, bootloader unlocking typically wipes device data so stolen devices should still be safe 9- despite #8, some devices might have vulns serious enough to allow kernel write before execution all in all, thanks to @Iskuri1 for sharing the research
English
1
0
1
76
Iskuri
Iskuri@Iskuri1·
@SecurityJon Thanks, Jon! Yeah this one was more focused on the issues post-exploitation and the issues with it than anything else.
English
0
0
1
53
Jon Aubrey
Jon Aubrey@SecurityJon·
@Iskuri1 That was a good read, nice to see both what did, and didn’t work in the slides!
English
1
0
2
80
Iskuri
Iskuri@Iskuri1·
Both my DEF CON and Black Hat talks went really well! It has been a fantastic week!
English
0
0
17
1K
Iskuri
Iskuri@Iskuri1·
As the DEF CON media server has uploaded my slides, I can confirm that the talk I am doing tomorrow will be a two parter, with the second part being a secure boot compromise of Exynos-based Samsung smartphonss!
English
0
1
19
1.4K
Iskuri
Iskuri@Iskuri1·
Finished my first in-person Blackhat talk! It was an amazing crowd and had some great questions! #BHUSA
English
0
0
11
591