Alex Plaskett's Avatar

Alex Plaskett

@alexplaskett.bsky.social

Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.

397 Followers  |  122 Following  |  52 Posts  |  Joined: 04.07.2023
Posts Following

Posts by Alex Plaskett (@alexplaskett.bsky.social)

Preview
China’s Unitree fixes flaw that gives hackers remote control of robots The start-up has downplayed the impact of the vulnerability, noting that the affected model has been discontinued.

Chinese robot maker Unitree has removed a problematic component from the firmware of its Go1 robot dog that could have allowed remote attackers to take over the robot

www.scmp.com/tech/tech-tr...

11.05.2025 16:51 β€” πŸ‘ 11    πŸ” 6    πŸ’¬ 2    πŸ“Œ 1
Post image

the takeover has begun..
trainings start tomorrow morning!

11.05.2025 17:39 β€” πŸ‘ 12    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - jduck/bs25-slides: Slides from "Musing from Decades of Linux Kernel Security Research" at BOOTSTRAP25 Slides from "Musing from Decades of Linux Kernel Security Research" at BOOTSTRAP25 - jduck/bs25-slides

Happy to share my slides from BOOTSTRAP25. Unfortunately the bug discussed is still not patched in Linux 6.14.0 despite it being reported explicitly. Slides are in markdown but there's a PDF in "releases" too github.com/jduck/bs25-s...

25.03.2025 19:26 β€” πŸ‘ 14    πŸ” 7    πŸ’¬ 1    πŸ“Œ 0

Delighted that our paper on "Grammar mutation for testing input parsers" - led by Bachir Bendrissou and joint with @ccadar.bsky.social - is now published in ACM TOSEM! This came from a registered report at FUZZING. Check it out! doc.ic.ac.uk/~afd/papers/...

14.01.2025 10:19 β€” πŸ‘ 14    πŸ” 6    πŸ’¬ 1    πŸ“Œ 0
Phrack Graffiti Logo

Phrack Graffiti Logo

Reminder that the Phrack 72 CFP closes APRIL 1ST 2025. Get your papers in and come be a part of our fabulous 40th anniversary issue!

See phrack.org for more info

13.03.2025 19:41 β€” πŸ‘ 27    πŸ” 17    πŸ’¬ 0    πŸ“Œ 0
table of contents for tmp.0ut volume 4

table of contents for tmp.0ut volume 4

Would you look at that, it's tmp.0ut Volume 4! Happy Friday, hope you enjoy this latest issue!

tmpout.sh/4/

21.03.2025 16:26 β€” πŸ‘ 123    πŸ” 65    πŸ’¬ 2    πŸ“Œ 7

Only a week and a half left for USENIX WOOT '25 conference submissions - deadline March 11 AoE. We’re looking forward to seeing even more of your amazing offensive security papers this year! And still a few days for up-and-coming track (March 4). CfP at www.usenix.org/conference/w...

28.02.2025 20:56 β€” πŸ‘ 5    πŸ” 10    πŸ’¬ 0    πŸ“Œ 2

We discover 119 vulnerabilities in LTE/5G core infrastructure, each of which can result in persistent denial of cell service to an entire metropolitan area or city and some of which can be used to remotely compromise and access the cellular core.
https://cellularsecurity.org/ransacked

20.02.2025 03:10 β€” πŸ‘ 22    πŸ” 10    πŸ’¬ 0    πŸ“Œ 3
This ESP32 Antenna Array Can See WiFi
YouTube video by Jeija This ESP32 Antenna Array Can See WiFi

I watch and read and I’ve seen a manner research. But this research into visualising Wi-Fi signals using an array of ESP32 chips is something else.

www.youtube.com/watch?v=sXwD...

It is that good. That deep and frankly so out there and he calls himself a mediocre engineer too. WTF?

Blown away.

16.02.2025 16:51 β€” πŸ‘ 30    πŸ” 9    πŸ’¬ 6    πŸ“Œ 1
.:: Phrack Magazine ::. Phrack staff website.

Hackers rejoice!

We are releasing the Phrack 71 PDF for you today!

Don't forget this year is Phrack's 40th anniversary release! Send in your contribution and be part of this historical issue!

The CFP is still open, you can find it and the PDF link at phrack.org

15.02.2025 15:02 β€” πŸ‘ 63    πŸ” 32    πŸ’¬ 2    πŸ“Œ 1

Update your AMD Zen processor's BIOS: www.amd.com/en/resources...

Check with your OEM for BIOS updates with the new microcode patches, they have had some time to address this high importance item.

05.02.2025 00:56 β€” πŸ‘ 3    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
Decompiling 2024: A Year of Resurgance in Decompilation Research The year 2024 was a resurgant year for decompilation. Academic publications from that year made up nearly 30% of all top publications ever made in decompilat...

2024 was a significant year for decompilation, constituting a possible resurgence in the field. Major talks, the thirty-year anniversary of research, movements in AI, and an all-time high for top publications in decompilation.

Join me for a retrospective:
mahaloz.re/dec-progr...

29.01.2025 17:45 β€” πŸ‘ 22    πŸ” 9    πŸ’¬ 0    πŸ“Œ 0
Project Zero

Just unrestricted an issue that shows a fun new attack surface. Android RCS locally transcribes incoming media, making vulnerabilities audio codecs now fully-remote. This bug in an obscure Samsung S24 codec is 0-click

project-zero.issues.chromium.org/issues/36869...

10.01.2025 00:08 β€” πŸ‘ 38    πŸ” 16    πŸ’¬ 1    πŸ“Œ 2
Preview
WorstFit: Unveiling Hidden Transformers in Windows ANSI! πŸ“Œ This is a cross-post from DEVCORE. The research was first published at Black Hat Europe 2024. Personally, I would like to thank splitline, the co-author of this research & article, whose help

OMG, Orange Tsai released his latest new research 🀯 πŸ’£

blog.orange.tw/posts/2025-0...

10.01.2025 06:04 β€” πŸ‘ 34    πŸ” 20    πŸ’¬ 3    πŸ“Œ 2

Which will you be watching?

26.12.2024 08:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Ten Years of Rowhammer: A Retrospect (and Path to the Future) 38C3 The density of memory cells in modern DRAM is so high that disturbance errors, like the Rowhammer effect, have become quite frequent. An attacker can exploit Rowhammer to flip bits in inaccessible mem...

Ten Years of Rowhammer: A Retrospect (and Path to the Future)

fahrplan.events.ccc.de/congress/202...

From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11

fahrplan.events.ccc.de/congress/202...

26.12.2024 08:11 β€” πŸ‘ 13    πŸ” 7    πŸ’¬ 1    πŸ“Œ 0
Preview
Dialing into the Past: RCE via the Fax Machine – Because Why Not? 38C3 Remember the days when faxes were the pinnacle of office tech, and the sound of a paper getting pulled in was as satisfying as a fresh cup of coffee? Well, it's time to dust off those memories and re...

Dialing into the Past: RCE via the Fax Machine – Because Why Not?

fahrplan.events.ccc.de/congress/202...

Beyond BLE: Cracking Open the Black-Box of RF Microcontrollers

fahrplan.events.ccc.de/congress/202...

26.12.2024 08:11 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
From Pegasus to Predator - The evolution of Commercial Spyware on iOS 38C3 My talk explores the trajectory of iOS spyware from the initial discovery of Pegasus in 2016 to the latest cases in 2024. The talk will start with an analysis how exploits, infection vectors and meth...

From Pegasus to Predator - The evolution of Commercial Spyware on iOS

fahrplan.events.ccc.de/congress/202...

Auracast: Breaking Broadcast LE Audio Before It Hits the Shelves

fahrplan.events.ccc.de/congress/202...

26.12.2024 08:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
From fault injection to RCE: Analyzing a Bluetooth tracker 38C3 The Chipolo ONE is a Bluetooth tracker built around the Dialog (now Renesas) DA14580 chip. This talk will present the research made on this device, from extracting the firmware from the locked down ch...

From fault injection to RCE: Analyzing a Bluetooth tracker

fahrplan.events.ccc.de/congress/202...

Proprietary silicon ICs and dubious marketing claims? Let's fight those with a microscope!

fahrplan.events.ccc.de/congress/202...

Hacking the RP2350

fahrplan.events.ccc.de/congress/202...

26.12.2024 08:11 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
ACE up the sleeve: Hacking into Apple's new USB-C Controller 38C3 With the iPhone 15 & iPhone 15 Pro, Apple switched their iPhone to USB-C and introduced a new USB-C controller: The ACE3, a powerful, very custom, TI manufactured chip. But the ACE3 does more than ju...

Looking through the schedule of #38c3 which starts tomorrow. Some talks I’ll be watching the streams for this year:

ACE up the sleeve: Hacking into Apple's new USB-C Controller

fahrplan.events.ccc.de/congress/202...

Liberating Wi-Fi on the ESP32

fahrplan.events.ccc.de/congress/202...

26.12.2024 08:11 β€” πŸ‘ 13    πŸ” 3    πŸ’¬ 2    πŸ“Œ 0
Post image

vacation reading material acquired!

23.12.2024 15:32 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

Pretty interesting technique used by _mccaulay here to understand the heap better and aid exploitation of a TP-Link vulnerability!

www.nccgroup.com/uk/research-...

23.12.2024 15:18 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1
screenshot of the CFP on phrack.org

screenshot of the CFP on phrack.org

We updated our CFP for Phrack 72! The deadline is now April 1st 2025. Check the site for specifics on how to contribute, as well as some inspiration! We also posted a link to purchase physical copies of Phrack 71, and a donation link too. Enjoy!

phrack.org

16.12.2024 22:56 β€” πŸ‘ 116    πŸ” 60    πŸ’¬ 4    πŸ“Œ 4
A die photo of the Pentium processor with the main functional blocks labeled including the caches, instruction fetch and decode, integer execution, and floating point. The image consists of complex patterns of rectangular regions in reddish and brownish colors. The image zooms in on a small part of the floating point unit giving a detail of an adder and PLA circuit.

A die photo of the Pentium processor with the main functional blocks labeled including the caches, instruction fetch and decode, integer execution, and floating point. The image consists of complex patterns of rectangular regions in reddish and brownish colors. The image zooms in on a small part of the floating point unit giving a detail of an adder and PLA circuit.

Intel launched the Pentium processor in 1993. Unfortunately, dividing sometimes gave a slightly wrong answer, the famous FDIV bug. Replacing the faulty chips cost Intel $475 million. I reverse-engineered the circuitry and can explain the bug. 1/9

06.12.2024 16:48 β€” πŸ‘ 711    πŸ” 235    πŸ’¬ 16    πŸ“Œ 27

I wrote a fun, little blog post. Remote pre-auth file deletion in SolarWinds ARM allowed to achieve LPE on AD machines πŸ™ƒ

12.12.2024 18:03 β€” πŸ‘ 9    πŸ” 6    πŸ’¬ 1    πŸ“Œ 0
Preview
Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623) Note: this is a rapidly-drafted post on an evolving topic - we'll update the post with more details as we discover more about the situation. Hit that F5 key regularly for updates! We were having a ...

A PoC for that Cleo zero-day is now live: labs.watchtowr.com/cleo-cve-202...

12.12.2024 00:04 β€” πŸ‘ 12    πŸ” 8    πŸ’¬ 0    πŸ“Œ 0
Preview
Forget PSEXEC: DCOM Upload & Execute Backdoor Join Deep Instinct Security Researcher Eliran Nissan as he exposes a powerful new DCOM lateral movement attack that remotely writes custom payloads to create an embedded backdoor.

New DCOM lateral movement technique discovered that bypasses traditional defenses. Unlike previous attacks relying on IDispatch interfaces, this method exploits undocumented COM interfaces within MSI, specifically targeting IMsiServer and IMsiCustomAction interfaces. 1/7

12.12.2024 00:00 β€” πŸ‘ 21    πŸ” 17    πŸ’¬ 2    πŸ“Œ 0
Preview
GitHub - RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC Course materials for Modern Binary Exploitation by RPISEC - RPISEC/MBE

Course materials for Modern Binary Exploitation by RPISEC
github.com/RPISEC/MBE?s... via @alexplaskett.bsky.social

10.12.2024 08:09 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
A Navajo rug with a complex pattern with muted reds, pinks and blues. The pattern consists of various vertical and horizontal rectangles with stripes. Around the border are small alternating black and colored rectangles. The weaving is mounted in a wooden frame and hanging on the museum wall.

A Navajo rug with a complex pattern with muted reds, pinks and blues. The pattern consists of various vertical and horizontal rectangles with stripes. Around the border are small alternating black and colored rectangles. The weaving is mounted in a wooden frame and hanging on the museum wall.

I recently saw an amazing Navajo rug at the National Gallery of Art. It looks abstract at first, but it is a detailed representation of the Intel Pentium processor. Called "Replica of a Chip", it was created in 1994 by Marilou Schultz, a Navajo/DinΓ© weaver and math teacher. 1/n

25.11.2024 16:29 β€” πŸ‘ 2928    πŸ” 922    πŸ’¬ 35    πŸ“Œ 69
Preview
Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection Introduction Hello, I’m RyotaK (@ryotkak ), a security engineer at Flatt Security Inc. A few days ago, I was upgrading my home lab network, and I decided to upgrade the OpenWrt on my router.1 After ac...

If you're interested in the technical details, I wrote the blog post here: flatt.tech/research/pos...

For the further details, please check out the announcement from the OpenWrt team: lists.openwrt.org/pipermail/op... (2/2)

07.12.2024 09:47 β€” πŸ‘ 17    πŸ” 8    πŸ’¬ 0    πŸ“Œ 1