Breaking 'Em All!
The blog posts going deeper into hacking Pokemon Go that accompany my #DEFCON talk are live on my blog!
taltechtreks.com/2024/04/06/H...
taltechtreks.com/2025/08/09/H...
Happy to get questions on the research!
@taltechtreks.com.bsky.social
Security Researcher | Blog writer | Hacker | DEFCON speaker | Gamer | Silly stuff lover. https://taltechtreks.com/
Breaking 'Em All!
The blog posts going deeper into hacking Pokemon Go that accompany my #DEFCON talk are live on my blog!
taltechtreks.com/2024/04/06/H...
taltechtreks.com/2025/08/09/H...
Happy to get questions on the research!
Talking in an hour at #DEFCON about Pokemon Go on track 3. Couldn't be more excited!
I've worked on it multiple nights in the past months, and I hope you'll enjoy it!
If you're not here in person, you can catch the talk live at www.youtube.com/live/fzbrrKP...
or www.twitch.tv/defcon_dctv_...
Giving a talk on Pokemon Go, I just had to convert myself to a Pokemon trainer.
The amazing Ryan Rockenbaugh surprised me with a limited edition sticker of Trainer Tal
Sticker wall at #DEFCON got 2, and I will be giving what's left tomorrow at my talk
Breaking 'Em All! 11:30 Track 3. See you!
Excited and humbled to speak once again in DEF CON.
Talk is on Saturday at 11:30, track 3.
I'll be in the conf till Sunday, hit me up if you want to chat over the talk or any other project.
The #DEFCON 33 schedule is live and I'm excited to announce I'll be giving a talk this year on unique research I was a part of a few years back!
"Breakin 'Em All โ Overcoming Pokรฉmon Go's Anti-Cheat Mechanism"
Join me on stage - Sat, 11:30 AM, Track 3
defcon.org/html/defcon-...
Looks like I'll be at Hacker Summer Camp this year!
Exciting #DEFCON33 โบ
Just got back from #AppSecIL2025!
Ended up 4th place in the #CTF ๐
Solved 12/15 challenges alone - Android pwn, JS sandbox escapes, cache poisoning, XSS bypasses. The usual suspects: SQLi, LDAP injection, XXE.
Had a blast!
Looking forward to the next one.
Writeup: taltechtreks.com/2025/06/04/a...
I'm building something cute and new, but as opposed to my normal ways, this time I'm using #Cursor heavily and the flow blows my mind.
Although I'm certain that without prior good knowledge of coding it wouldn't work that well.
Ah, I wondered when this was due to come out.
Can't wait to experiment!
www.anthropic.com/news/integra...
Excited to present my research tomorrow at #RSAC!
Come by to hear John and me share conclusions and insights on the first publicly available report on Non-Human identity security!
See you there,
May 1, 10:50 am at Moscone West 3004!
For today, a bit Friends content! Or, uhh, actually, computer science!
Whatโs the largest sofa you can pivot around a corner?
Heard about this problem in the past, but I thought it's one of those we will never be able to prove. (At least until quantum computers arrive to solve some NP problems)
Took a bit of hiatus from posting here, was quite busy the past few months (CFP season amirightโฆ)
But I do have more cool stuff ready for sharing as well as writing 2 blog posts about projects I worked on lately.
Looking forward to sharing with you all
Great time presenting OWASP NHI Top 10 at #SnowFROC!
If you're here, come say hi!
Well, that was an hour of my life well spent.
An amazing adaptation of minesweeper to include old-school RPG elements.
UPDATE: Had to go back and play, another 4 hours to achieve a perfect clear. Incredible game!
Great thread on the emerging new details on the ByBit breach
06.03.2025 23:59 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0A cute post showcasing the basis of every website - HTML! The site goes over (almost) all HTML tags, by using them.
Seeing this, itโs unfortunate that text inputs in websites don't allow most tags but rather encapsulate how the final result is displayed for users. Give us more, please!
Managed to squeeze in 2 talk submissions to #fwd:cloudsec just before the first round CFP closes.
Hoping for good news, will be the perfect reason to finally attend in person!
Check out this wild project: #Steam #Brick.
The author transformed the Steam Deck to a brick that still connects to screens or VR while reducing size by a third
Projects like this (author used steam-provided data) are a great example of "right-to-own", critical to enhance electronics sustainability
Thanks for the shout-out!
Happy to see the starterpack in use ๐
#OAuth #phishing apps are coming to get you - now on #X!
It's annoying to see yet another case of how easy it is to fake consent screens that look identical to real companies.
Why we still lack mandatory verification processes for new OAuth apps is beyond me.
x.com/thealexbanks...
This researcher found a clever persistence trick: create a rogue #OIDC provider mimicking an existing one, then silently tweak the conditions.
Easy to miss, but it lets an attacker retain access to a compromised account.
How many orgs actually audit their OIDC roles? Feels like a blind spot.
#OIDC identity providers in #AWS have been getting more attention lately and rightfully so: Itโs unfortunately surprisingly easy (and common) to create misconfiguration within the necessary conditions on OIDC-based #IAM roles trust policy.
20.02.2025 20:16 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0So, #OAuth implementations seem to always have some edge case or quirk making it vulnerable in odd ways.
This particular exploit leveraged an open redirect in an app's OAuth callback, combined with #Google OAuth's quirks to steal authorization codes on visiting a malicious website.
#DeepSeek roasts me based on my #UserAgent:
Your browser history is so bare even your referrer ghosted you, your 2560x1440 screen is just compensating for how bland Firefox 134 on Windows 10 is, and 16 CPU cores in Tel Aviv? Congrats, youโre the NPC overclocking spreadsheets in the Silicon Wadi.
Cute bit of #internet history, this post shows why #Git gives you 0.1 seconds to decide if it runs a fixed command.
Turns out, backwards compatibility in code is hard, especially if the code is distributed widely, and can lead to these kind of funny instances (and other that can cause real damage)
The author created a CPU #JTAG breakout and by inserting it between the balls and the CPUโmanages to successfully debug the Xbox and extract the holy grailโa secret 512-byte boot ROM.
This ROM was originally extracted in other methods which allowed #Jailbreaking the #Xbox in the first place.
Of course, it can't that simple. #Microsoft took a straightforward but effective countermeasureโgrounding the #TRST pin, effectively locking out #JTAG access on retail consoles.
Additionally, the #CPU is soldered on a ball-grid-array, making direct patching nearly impossible. But - thereโs a way!
I love #hacking #embedded systems, and also #gaming when time permits.
Imagine my delight seeing a post that blends both! Two decades after its release, someone revisits the idea of โjustโ using the original #Xbox CPU's #JTAG connector to debug it.
The Dead Internet Theory is just a meme, right?
Wellโฆsomething strange happens over at PhysicsForums. Once an active forum for physics students, now a quieter place.
A year ago, posts appeared, made by users long after their last login. LLM-generated replies back-inserted into the DB
Must read!
Hey, Erica! :) Glad to have you over here too.
09.02.2025 10:11 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0