Jesse Michael

1.7K posts

Jesse Michael banner
Jesse Michael

Jesse Michael

@jessemichael

Portland Katılım Temmuz 2008
1.3K Takip Edilen1.2K Takipçiler
Jesse Michael retweetledi
MG
MG@_MG_·
If you use a personal phone/laptop for your work, pay very close attention to this little detail. Iran attackers wipe 200k devices at a company called Stryker. Within those devices appears to be employees PERSONAL devices. The attackers used the company’s MDM software, which is basically IT management software running on everything. It’s an incredibly attractive backdoor to an attacker. I successfully targeted MDM software for several Red Team engagements. It’s… lots of fun :) Anyway, a lot of companies require you to install their MDM software on your personal devices before you can access resources like Corp email. It’s used to keep devices updated, lock things down if they get stolen, etc. The company often promises that they won’t access personal data, erase any personal data, etc. But this is often ONLY POLICY. If a bad actor gains access to the MDM tool, as was the case here, then anything can happen. People should be aware of these risks. I refused to run MDM software on any of my personal devices. The company needs to provide me with hardware if they want that. I personally isolate all corp devices to their own network too. If an adversary can get into the corp laptop, then can then get inside my network… there have been cases of it happening in the past.
MG tweet media
Kim Zetter@KimZetter

I've published more details about the cyberattack in this piece: zetter-zeroday.com/iranian-hackti…

English
88
652
3.3K
560.7K
Jesse Michael retweetledi
Piotr Migdal
Piotr Migdal@pmigdal·
Claude can code, but can it read machine code? We gave AI agents access to Ghidra (a decompiler by the NSA) and tasked them with finding hidden backdoors in servers - working solely from binaries, without any access to source code. See our BinaryAudit: quesma.com/blog/introduci…
Piotr Migdal tweet media
English
75
181
1.5K
231K
Jesse Michael retweetledi
x86matthew
x86matthew@x86matthew·
here's a small project i put together recently - a custom "bare-metal" protected-mode x86 NES emulator. it fits into 1MB RAM and loads ROMs from a floppy disk, no OS required. if you want to turn your old PC into an awkward NES clone with bad sound emulation then look no further.
English
3
36
232
17.5K
Jesse Michael retweetledi
chompie
chompie@chompie1337·
Watch XOR’s talk CUDA de Grâce: Owning AI Cloud Infrastructure with GPU exploits Kernel + driver bugs aren’t just a LPE problem, they’re a cloud problem. With the explosion of AI in the cloud, NVIDIA’s GPU drivers have become a valuable attack surface youtu.be/Lvz2_ZHj3lo
YouTube video
YouTube
English
5
74
296
50.7K
Jesse Michael retweetledi
Xeno Kovah
Xeno Kovah@XenoKovah·
A ton of great info here about what Apple does for their secure boot chain: “A Reverse Engineer’s Anatomy of the macOS Boot Chain & Security Architecture” stack.int.mov/a-reverse-engi…
English
1
30
104
10.5K
Jesse Michael retweetledi
Philippe Lemoine
Philippe Lemoine@phl43·
If you feel like you're bad at your job and it's making you depressed, just consider that, as the investigation of the recent heist revealed, the password to access the Louvre's videosurveillance system was "Louvre".
English
672
14K
161.7K
4.1M
Jesse Michael retweetledi
RossRadio
RossRadio@cqcqcqdx·
how do I deflate this to allow it to fit back in❔
RossRadio tweet media
English
217
24
656
34.2K
Jesse Michael retweetledi
chompie
chompie@chompie1337·
kernel hackers go serverless ring0 → cloud 9 ☁️ ?? brb pwning yr gpu nodes ✨
English
23
119
614
61.5K
Jesse Michael
Jesse Michael@jessemichael·
@HackingLZ I gave up on IDA Pro/Hex-Rays when they switched to the subscription model and declined to renew at that point. I've moved on to using Binja for most things, but using Ghidra with a Ghidra server works fairly well to collaborate on a large binary with a team.
English
0
0
3
288
Justin Elze
Justin Elze@HackingLZ·
Sorta conflicted if I renew my home license for IDA or move on
Justin Elze tweet media
English
15
0
19
7.7K
Jesse Michael retweetledi
chompie
chompie@chompie1337·
I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard to figure out what to do. Try the PhrackCTF which I've now open-sourced. It's not a contrived CTF - modeled after real vulnerabilities github.com/xforcered/Phra…
English
10
148
616
51.7K
Jesse Michael retweetledi
Phrack Zine
Phrack Zine@phrack·
At long last - Phrack 72 has been released online for your reading pleasure! Check it out: phrack.org
Phrack Zine tweet media
English
7
320
751
124.8K
Jesse Michael retweetledi
chompie
chompie@chompie1337·
The Phrack Binary Exploitation CTF hasn’t been solved yet!! 2 challenges unlock #Phrack72 to the public. 1 Linux challenge and 1 Windows kernel challenge — based on my favorite real life bugs. Win an exclusive Phrack coin and get your write up on the website!
SolidSnake\0x91\0x05@SolidSnake9105

At @defcon! I'm looking for someone with the #WHY2025 edition of @phrack to trade QR halves for the #Phrack72 CTF. Drop me a DM if interested!. @netspooky @chompie1337 @richinseattle

English
5
28
155
20.9K
Jesse Michael retweetledi
Mickey
Mickey@HackingThings·
Here’s a video of an exploited Lenovo 510 FHD Webcam downloading a meterpreter payload from the internet and executing it, letting us send keystrokes to the computer it’s connected to, then return to being a regular unsuspecting webcam 😄 (Top left: webcam serial port output Bottom left: kali instance in the cloud Right: victim laptop view)
English
2
6
18
10.9K