
Now that the “Android Hackers Handbook” is a wrap and off to the printers, I (Ridley) have been flushing the queue on the last 1.5 years worth of incomplete blogposts. We’ve posted a few here and there, but not nearly as many as we started and didn’t finish. So, for the last few days I have been uploading photos, adding links, and putting finishing touches on a number of posts we’ve had sitting in the hopper for way too long.
I published about 6 within the last day or so, and the rest will trickle out in the next few days as photos finish uploading and they get proof-read. We are publishing them for the dates we started them (so in chronological order) so we made a list of what’s been getting moldy over the last 1.5 years (the linked ones we published today and the unlinked will come in the next few days):
Breakpoint & RuxCon 2012: A long overdue blogpost- NoSuchCon 2013:
N**gasHackers in Paris Infiltrate 2013: “Miami. Joeboy. Quickstudy.”- Announcement of our new course for 2014:
- “Software Exploitation Via Hardware Exploitation” or (SExViaHardwareExploitation)
- Our trip to Hamburg, Germany to speak at 30-year anniversary of CCC (30C3)
- Why Writing Firmware Is Kinda Reminds me of Software Exploitation (i.e. How I debugged my firmware when my debugger failed)
Creating The USB Condom- Manufacturing FaceDancers for the InfoSec Community
Building INT3.CC: A store for custom research hardware devices for and by infosec researchersA week in San Fran with Riscure: How we got Schooled on Differential Power Analysis, SPA, and more…- Assembling ARM Shellcode without a lot of GNU-asspain
- ARM Exploitation in the Big Apple
ARMTechCon 2012Reykjavík, Iceland (Nordic Sec Conference)- A New Page on this Blog: “Photos of Cons & Things”
- Blackhat 2013: Yes, more ARM sh*t.
Posted on January 31, 2014 by s7ephen
0