HaxRob

858 posts

HaxRob banner
HaxRob

HaxRob

@haxrob

I enjoy breaking things. Telco / mobile and IoT security. Surfing the information super highway one keystroke at a time.

Australia Katılım Nisan 2017
458 Takip Edilen15.1K Takipçiler
Sabitlenmiş Tweet
HaxRob
HaxRob@haxrob·
A friend asked me to find out why his connected lightbulb app was asking for his location, so I ducked out to Australia’s favourite hardware store, Bunnings, and grabbed one to check out. The Android grid connect app has 500k+ downloads. Let’s take a quick look! 🧵 (1/n)
HaxRob tweet media
English
106
1.5K
5.3K
1.4M
Goose
Goose@0xmadvise·
Hello, i wrote a blog on one of the modern persistence techniques in Linux using the unshare syscall. Enjoy reading @0xmadvise/rJPLNLRwlx" target="_blank" rel="nofollow noopener">hackmd.io/@0xmadvise/rJP…
English
5
16
47
4.4K
HaxRob
HaxRob@haxrob·
@TheHackersNews The group-ib report seems to have omitted one of most important details: hashes of the sample(s) ....
English
0
0
2
380
The Hacker News
The Hacker News@TheHackersNews·
🔥 A hacker gang planted a 4G Raspberry Pi inside a bank’s ATM network—bypassing firewalls to install a rootkit called CAKETAP. It spoofed PIN checks, hid processes, and aimed to trigger fraudulent withdrawals. Details you should know ↓ thehackernews.com/2025/07/unc289…
English
15
125
398
81.5K
Alex Vacca
Alex Vacca@itsalexvacca·
Facebook once bought a VPN app for $120M and turned it into a surveillance tool that spied on 33M+ users' entire phones for years. This app helped Zuck buy WhatsApp for a whopping $19B and break Snapchat's encryption. Thread
English
2.1K
24.5K
127.8K
50.3M
HaxRob
HaxRob@haxrob·
@e__soriano Nice one - creative use within user space rootkits. I have just referenced your paper in the appendix of the post under 'related research'.
English
1
1
5
195
HaxRob
HaxRob@haxrob·
A relatively unknown but particularly stealthy technique to hide files on Linux hosts. On unhardened boxes, unprivileged users can conceal files from even the root user. Disk content remains in memory, hindering disk acquisition during forensic investigation. (1/7) 👇
English
3
53
360
33.7K
HaxRob
HaxRob@haxrob·
This method can be utilized to perform process masquerading.. Here an implant appears to be running from /usr/sbin/auditd but it's actually 'fileless'. No '(deleted)', no ':memfd', no '/dev/shm', no ptrace, no LD_PRELOAD. Just stealth. (6/7)
HaxRob tweet media
English
1
2
20
2.7K
HaxRob
HaxRob@haxrob·
Forget compliance by severity color, how about compliance by emoji happiness level? #systemd, stay classy. 🙃
HaxRob tweet media
English
1
0
21
1.6K
HaxRob
HaxRob@haxrob·
Newer samples can be found to have the authentication password as a salted MD5 hash. github.com/haxrob/bpfdoor… can extract the hashes from samples and generate the respective hashcat command. Here are a few cracked ones. Those that identify victims are not included. (21/x)
HaxRob tweet media
English
1
2
9
1.3K
HaxRob
HaxRob@haxrob·
Newer variants of the #BPFDoor has an interesting modification made that avoids detections looking for processes with raw sockets. The kernel reports SOCK_DGRAM rather then rather loud "SOCK_RAW". Here we have a sample found in the recent SKT telco breach. (1/20)
HaxRob tweet media
English
1
50
159
22.8K