Alaid TechThread
677 subscribers
6 photos
1 video
83 files
1.31K links
Vulnerability discovery, threat intelligence, reverse engineering, AppSec
Download Telegram
Forwarded from Noise Security Bit (AM)
Hardwear.io Virtual Con на удивление может затмить многие офлайн эвенты!
Посмотрите сами на доклады 👁:

🧨 LVI: Hijacking Transient Execution with Load Value Injection

🧨 Firmly Rooted in Hardware: Practical protection from firmware attacks in hardware supply chain

🧨 Capturing Mask ROMs

🧨 Hints from Hardware Security for solving real-world challenges

Мероприятие абсолютно бесплатное🚀
👇👇👇
https://hardwear.io/virtual-con-2020/
A practical guide to red team development and operations

https://redteam.guide/docs/
Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware historian. Polypyus works without disassembling these binaries, which is an advantage for binaries that are complex to disassemble and where common tools miss functions. In addition, the binary-only approach makes it very fast and run within a few seconds.

https://github.com/seemoo-lab/polypyus
PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more)

https://windows-internals.com/printdemon-cve-2020-1048/