ash's Avatar

ash

@repne.bsky.social

Currently focused on Red Teaming/Adversarial Simulation @ Google. Previously App Sec, Malware RE and Threat Intel. I also like video games and general tech.

217 Followers  |  362 Following  |  11 Posts  |  Joined: 09.11.2024  |  1.5879

Latest posts by repne.bsky.social on Bluesky

Preview
Spyware-maker NSO ordered to pay $167 million for hacking WhatsApp A jury ordered huge punitive damages against NSO, the Israel-based maker of spyware already banned from use in the U.S.

A fascinating development for the offensive industry:

www.washingtonpost.com/technology/2...

07.05.2025 08:26 β€” πŸ‘ 12    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0

This esp32 "bluetooth backdoor" doesn't sound very different from what @naehrdine.bsky.social + crew found in bcm43xx to develop github.com/seemoo-lab/i...

09.03.2025 01:16 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

A watched fuzzer never boils...

06.03.2025 03:50 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

I got Linux running in a PDF file using a RISC-V emulator.

PDFs support Javascript, so Emscripten is used to compile the TinyEMU emulator to asm.js, which runs in the PDF. It boots in about 30 seconds and emulates a riscv32 buildroot system.

linux.doompdf.dev/linux.pdf
github.com/ading2210/li...

31.01.2025 20:02 β€” πŸ‘ 313    πŸ” 130    πŸ’¬ 12    πŸ“Œ 22
Post image

Positive Technologies has developed a new attack that exploits the SD Express standard to gain access to a device's memory through its SD card reader

The DaMAgeCard attack exploits the fact that the new SD Express standard can operate in both SDIO and NVMe

swarm.ptsecurity.com/new-dog-old-...

08.12.2024 11:11 β€” πŸ‘ 59    πŸ” 24    πŸ’¬ 4    πŸ“Œ 4

I should write a bittorrent client

30.11.2024 07:26 β€” πŸ‘ 1077    πŸ” 20    πŸ’¬ 60    πŸ“Œ 8

Heh, cool amanita.us-east.host.bsky.network/xrpc/com.atp...

25.11.2024 14:51 β€” πŸ‘ 10    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1
Preview
Reverse Engineering iOS 18 Inactivity Reboot Wireless and firmware hacking, PhD life, Technology

How does the new iOS inactivity reboot work? What does it protect from?

I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.

naehrdine.blogspot.com/2024/11/reve...

17.11.2024 21:42 β€” πŸ‘ 279    πŸ” 107    πŸ’¬ 12    πŸ“Œ 11

Looking at this list of 2023 routinely exploited issues It's always interesting to look at the split between memory safety issues and bug classes. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a

15.11.2024 03:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

A brief history of Cyrix https://www.abortretry.fail/p/a-brief-history-of-cyrix

14.11.2024 06:32 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Anyone got a sample?

14.11.2024 00:56 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Gotcha, yeah, definitely not a hermetic build :)

11.11.2024 11:48 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

When then I think it's compile time evaluated, not runtime, right?

11.11.2024 11:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
HEXACON 2024 - YouTube

Talks from the Hexacon 2024 security conference, which took place earlier this month, are available on YouTube

www.youtube.com/playlist?lis...

10.11.2024 12:00 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

Great presentation on macOS sandbox escapes https://github.com/jhftss/jhftss.github.io/blob/main/res/slides/A%20New%20Era%20of%20macOS%20Sandbox%20Escapes.pdf

11.11.2024 04:57 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Is it actually building malware.rs or is it just retrieving the contents of a text file? Sorry, I don't know rust but it seems to be the latter?

11.11.2024 04:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

You can do some magical things with paths on Windows. If you haven’t seen it before JonasLyk’s work on β€œwebdav based reflective loader/per process devicemap based dll injector POC” is a work
of art. Search his handle + webdav on X for some commentary
github.com/jonaslyk/tem...

11.11.2024 02:28 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Inside a Firewall Vendor's 5-Year War With the Chinese Hackers Hijacking Its Devices Sophos went so far as to plant surveillance β€œimplants” on its own devices to catch the hackers at workβ€”and in doing so, revealed a glimpse into China's R&D pipeline of intrusion techniques.

I remember when we only had to worry about Dr Watson :) www.wired.com/story/sophos...

11.11.2024 03:57 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

New here but I'm feeling optimistic that this might actually replace what infosec twitter used to be

11.11.2024 03:37 β€” πŸ‘ 18    πŸ” 2    πŸ’¬ 2    πŸ“Œ 0

@repne is following 20 prominent accounts