HäjySec, anyone? I am speaking at HäjySec March Meetup on ”So how do you know if you are lied to?”.
Posts by sukelluskello
@helsec.bsky.social HelSec Ry seeks for volunteers! Get involved, you familiar and new faces. Fill in the form here: docs.google.com/forms/d/e/1F...
A plea to the cryptography community: let's please all agree to use seeds as ML-KEM keys.
Seeds are generally preferable to expanded keys because they are smaller and don't require validation. Having one key format is VASTLY preferable to having two.
Interesting white paper (2022) on attacking cars wireless exposed communication (Tesla Model Y, NFC and Proxmark)
White paper link: act-on.ioactive.com/acton/attach...
#automotive #cybersecurity
Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3
web.archive.org/web/20230522...
#reverseengineering #infosec
Excellent CTF challenges writeups for learning the msg_msg technique for arbitrary read and write for Linux kernel exploitation
syst3mfailure.io/wall-of-perd...
willsroot.io/2021/08/corc...
#Linux #cybersecurity
Excellent introduction guide to ARM TrustZone and embedded systems security
embeddedsecurity.io
#trustzone #infosec
Reverse engineering and analysis to the Sonos One speaker (HITB 2023 presentation)
conference.hitb.org/files/hitbse...
#sonos #cybersecurity
Great series for learning ELF file format internals
Part 1: intezer.com/blog/researc...
Part 2: intezer.com/blog/malware...
Part 3: intezer.com/blog/malware...
Part 4: intezer.com/blog/malware...
#elf #cybersecurity
Interesting reading on Windows kernel vulnerable drivers and how to identify them
blogs.vmware.com/security/202...
#cybersecurity #Windows
Beginners series for starting with embedded devices reverse engineering
Ghidra setup: voidstarsec.com/blog/ghidra-...
Tools: voidstarsec.com/blog/intro-t...
Firmware extraction: voidstarsec.com/blog/uart-ub...
#reverseengineering #cybersecurity
Excellent beginners introduction to Windows kernel exploitation
Part 1: mdanilor.github.io/posts/hevd-0/
Part 2: mdanilor.github.io/posts/hevd-1/
Part 3: mdanilor.github.io/posts/hevd-2/
Part 4: mdanilor.github.io/posts/hevd-3/
Part 5: mdanilor.github.io/posts/hevd-4/
#windows #infosec
Excellent overview of glibc heap exploitation techniques
0x434b.dev/overview-of-...
#glibc #cybersecurity
Series on "Reverse Engineering Dark Souls 3 Networking"
1. Connection: timleonard.uk/2022/05/29/r...
2. Packets: timleonard.uk/2022/06/02/r...
3. Key exchange: timleonard.uk/2022/06/03/r...
4. Reliable UDP: timleonard.uk/2022/06/09/r...
#networking #reverseengineering