Advertisement · 728 × 90

Posts by sukelluskello

Post image

HäjySec, anyone? I am speaking at HäjySec March Meetup on ”So how do you know if you are lied to?”.

1 year ago 0 0 0 0
#burgerac.band

#burgerac.band

#burgerac.band #helsinki #punk #pippilångstrump

1 year ago 1 0 0 0
Post image

#catcafe #helsinki #helkatti

1 year ago 0 0 0 0
Post image

@helsec.bsky.social HelSec Ry seeks for volunteers! Get involved, you familiar and new faces. Fill in the form here: docs.google.com/forms/d/e/1F...

1 year ago 0 0 0 0
Preview
Let’s All Agree to Use Seeds as ML-KEM Keys ML-KEM private key seeds are vastly preferable to expanded decapsulation keys as a storage format. A plea to standardize on them.

A plea to the cryptography community: let's please all agree to use seeds as ML-KEM keys.

Seeds are generally preferable to expanded keys because they are smaller and don't require validation. Having one key format is VASTLY preferable to having two.

1 year ago 33 10 2 0
Post image Post image

Interesting white paper (2022) on attacking cars wireless exposed communication (Tesla Model Y, NFC and Proxmark)

White paper link: act-on.ioactive.com/acton/attach...

#automotive #cybersecurity

2 years ago 3 4 0 0
Post image Post image


Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3

web.archive.org/web/20230522...

#reverseengineering #infosec

2 years ago 0 1 0 0
Post image Post image

Excellent CTF challenges writeups for learning the msg_msg technique for arbitrary read and write for Linux kernel exploitation

syst3mfailure.io/wall-of-perd...
willsroot.io/2021/08/corc...

#Linux #cybersecurity

2 years ago 1 2 0 0
Advertisement
Post image Post image

Excellent introduction guide to ARM TrustZone and embedded systems security

embeddedsecurity.io

#trustzone #infosec

2 years ago 4 1 0 0
Post image Post image

Reverse engineering and analysis to the Sonos One speaker (HITB 2023 presentation)

conference.hitb.org/files/hitbse...

#sonos #cybersecurity

2 years ago 0 1 0 0
Post image Post image Post image

Great series for learning ELF file format internals

Part 1: intezer.com/blog/researc...
Part 2: intezer.com/blog/malware...
Part 3: intezer.com/blog/malware...
Part 4: intezer.com/blog/malware...

#elf #cybersecurity

2 years ago 0 1 0 0
Post image

Interesting reading on Windows kernel vulnerable drivers and how to identify them

blogs.vmware.com/security/202...

#cybersecurity #Windows

2 years ago 2 1 0 0
Post image

Beginners series for starting with embedded devices reverse engineering

Ghidra setup: voidstarsec.com/blog/ghidra-...

Tools: voidstarsec.com/blog/intro-t...

Firmware extraction: voidstarsec.com/blog/uart-ub...

#reverseengineering #cybersecurity

2 years ago 5 1 0 0
Post image

Excellent beginners introduction to Windows kernel exploitation

Part 1: mdanilor.github.io/posts/hevd-0/
Part 2: mdanilor.github.io/posts/hevd-1/
Part 3: mdanilor.github.io/posts/hevd-2/
Part 4: mdanilor.github.io/posts/hevd-3/
Part 5: mdanilor.github.io/posts/hevd-4/

#windows #infosec

2 years ago 1 2 0 0
Post image

Excellent overview of glibc heap exploitation techniques

0x434b.dev/overview-of-...

#glibc #cybersecurity

2 years ago 1 1 0 0
Advertisement
Post image Post image Post image Post image

Series on "Reverse Engineering Dark Souls 3 Networking"

1. Connection: timleonard.uk/2022/05/29/r...

2. Packets: timleonard.uk/2022/06/02/r...

3. Key exchange: timleonard.uk/2022/06/03/r...

4. Reliable UDP: timleonard.uk/2022/06/09/r...

#networking #reverseengineering

2 years ago 3 2 0 0