Lennert

427 posts

Lennert banner
Lennert

Lennert

@LennertWo

PhD Researcher @CosicBe | Hardware Security @[email protected]

Katılım Haziran 2011
1.4K Takip Edilen4K Takipçiler
Sabitlenmiş Tweet
Lennert
Lennert@LennertWo·
I am excited to announce that our talk "Glitched on Earth by humans" will be presented at @BlackHatEvents! I will cover how we glitched the Starlink User Terminal SoC bootrom using a modchip to obtain root. This might be the first tweet sent through a rooted Starlink UT! #BHUSA
Lennert tweet media
English
27
207
885
0
Lennert retweetledi
Sayon Duttagupta
Sayon Duttagupta@SayonDuttagupta·
Your earbuds are supposed to pair only when you tell them to. Our research shows that, for many Fast Pair devices, this assumption is wrong. We demonstrate silent hijacking, microphone access, and covert tracking at scale, without even touching your device. #WhisperPair 1/n
English
1
6
14
1.2K
Lennert
Lennert@LennertWo·
@PinkDraconian @aniziki @nmatt0 Please consider buying the @nostarch books instead of pirating them. I'd like to see more of their books in the future and they currently have a 40% discount going for the holidays. The hardware hacking handbook is great!
English
1
0
3
64
PinkDraconian
PinkDraconian@PinkDraconian·
I want to get into IoT penetration testing. Where do I start?🤔
English
8
1
31
2.4K
Lennert retweetledi
Raspberry Pi
Raspberry Pi@Raspberry_Pi·
Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In contrast, we aim to find and fix them. Read the results of our RP2350 Hacking Challenge: rpltd.co/rp2350-challen…
Raspberry Pi tweet media
English
15
199
913
107.3K
Lennert retweetledi
Sam Curry
Sam Curry@samwcyo·
New writeup from @_specters_ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia
English
86
983
3.6K
343.4K
Kyle Wiens
Kyle Wiens@kwiens·
@ghidraninja @iFixit Let me know what you think! We designed this exactly with use cases like yours in mind.
English
2
0
9
803
Lennert retweetledi
Raspberry Pi
Raspberry Pi@Raspberry_Pi·
Challenge… extended? At this year’s #DEFCON, we got to work with the brilliant teams over at @defcon and @hextreeio to create 30,000 gaming badges using our brand new chip, RP2350. Still in the gaming spirit, we challenged anyone with an RP2350 to try and hack around our security features to unlock the secret programmed into the secure on-chip storage. Currently, the security is still unbroken, and the $10,000 prize uncollected. Now, we've decided to goad the bounty hunters by doubling the prize money and extending the deadline to the end of the year. Think you’ve got what it takes? raspberrypi.com/news/30000-bad…
Raspberry Pi tweet media
English
5
101
437
66.6K
Lennert
Lennert@LennertWo·
@sundhaug92 @ghidraninja @barsteward There are two main indicators. The sensitive location is near the pins for the internal regulator (thus likely hitting the bond wires, or the regulator on die). The chip is much less sensitive to EMFI when supplying DVDD from an external power supply.
English
0
0
2
34
@Barsteward@bsky.social
@[email protected]@barsteward·
Pi Pico2 EMFI update: Not enough time; no chance of the $10k bounty, but fun testing glitch detection (spoiler: it’s good). Pics: 1. Glitch detection disabled 2. Detection enabled Red=Successful loop corruption Green=No effect Blue=Reboot Yellow=Caught by detector (1mm coil@200V)
@Barsteward@bsky.social tweet media@Barsteward@bsky.social tweet media
English
3
9
43
4.6K
Lennert retweetledi
NinjaLab
NinjaLab@NinjaLabFr·
We are very excited to share our last research work: 𝐄𝐔𝐂𝐋𝐄𝐀𝐊, authored by Thomas Roche. An electromagnetic Side-Channel Vulnerability in the ECDSA implementation of all Infineon security microcontrollers, notably impacting all YubiKey 5 Series. ninjalab.io/eucleak/
English
12
115
273
84.1K
Lennert retweetledi
Ian Carroll
Ian Carroll@iangcarroll·
In April, @samwcyo and I discovered a way to bypass airport security via SQL injection in a database of crewmembers. Unfortunately, DHS ghosted us after we disclosed the issue, and the TSA attempted to cover up what we found. Here is our writeup: ian.sh/tsa
English
51
630
2.2K
188.2K
Lennert
Lennert@LennertWo·
@CedHon @matthewvenn @Raspberry_Pi @bunniestudios Yes the picture was made with a similar approach, Bunnie has a much fancier LED positioning setup though! Generally speaking I think chip backside imaging methods have been in use since the 1990s!
English
0
0
1
108
Lennert
Lennert@LennertWo·
The new @Raspberry_Pi RP2350, as seen through the backside of the die.
Lennert tweet media
English
9
25
234
41.5K
Lennert
Lennert@LennertWo·
@wren6991 That's amazing, thanks for sharing!
English
0
0
0
112
Lennert retweetledi
Luke Wren @wren6991@types.pl
@LennertWo This is what I can label from memory. The std cell region is all a bit more wobbly, but here are the recognisable blocks.
Luke Wren @wren6991@types.pl tweet media
English
2
4
25
1.3K
Lennert
Lennert@LennertWo·
@mangeurdpommes @Raspberry_Pi Ha in this case the white spots are just specks of dust on the substrate. Not planned, but maybe we should try shooting the laser at it!
English
0
0
1
559
Lennert
Lennert@LennertWo·
@overduedelta No, this picture is taken through the silicon substrate of the die (so the backside). I did have to remove some of the chip packaging to reach the backside.
English
0
0
2
237
Lennert
Lennert@LennertWo·
@chriva404 @Raspberry_Pi This was specifically the RP2350B, but I assume all 4 options will have the same main die. The ones with flash included in the package probably have a separate flash die stacked inside the same package.
English
1
0
5
542
Lennert retweetledi
stacksmashing
stacksmashing@ghidraninja·
Let's talk about some of the security features of the new @Raspberry_Pi RP2350, because they are 🔥🧵
English
6
107
644
117K
Lennert retweetledi
hextree.io
hextree.io@hextreeio·
The new @Raspberry_Pi RP2350 is here - and it comes with a ton of security features. We teamed up with @Raspberry_Pi to create the RP2350 Hacking Challenge: A microcontroller bug-bounty. Bypass secure-boot on the RP2350 and win $10,000. hextree.io/rp2350-hacking…
hextree.io tweet media
Raspberry Pi@Raspberry_Pi

🚨 Meet Raspberry Pi Pico 2, our new $5 microcontroller board 🚨 The next big tiny thing, built using RP2350: a high-performance, secure microcontroller designed here at Raspberry Pi. raspberrypi.com/news/raspberry…

English
2
28
123
32.5K