For the last couple of years we’ve been teaching Practical ARM Exploitation. It’s sold out at every public offering (CanSecWest 2012 and BlackHat 2012 & 2013) and we’ve been fortunate enough to give it privately to a number of really amazing organizations. In 2011 we did a talk entitled “Hardware Hacking For Software People” at […]
Now that the “Android Hackers Handbook” is a wrap and off to the printers, I (Ridley) have been flushing the queue on the last 1.5 years worth of incomplete blogposts. We’ve posted a few here and there, but not nearly as many as we started and didn’t finish. So, for the last few days I […]
So a while back, @drakkhen and I were chatting and he suggested a simple device that would let him “airgap” his mobile devices from his computer but still use them for power. Like a “Charge-Only” USB cable but in an “adapter” form that you could use on normal USB Cables (the only previous alternative was […]
We haven’t done posts in a while. We’ve had quite few in the magazine for some time now, but have done a poor job of doing updates. We’ve been really busy lately but wanted to let folks know what we plan to do for more of 2013. So far this year we taught ARM Exploitation […]
March 21, 2013 by slawlerguy
Late last year we got an email from Paul Such (the founder of SCRT Information Security) inviting us to present and lead a workshop at the Insomni’hack 2013 conference. A workshop is like a 1-day, mini-training. The conference is a two-track one day conference with workshops beforehand, and an all-night hacking contest and CTF afterwards. Maybe this […]
In mid 2012 we received an email from several folks in Japan asking us if we intended to bring our “ARM Exploitation” course from Blackhat Las Vegas 2012 to Asia. We had originally planned to do our class elsewhere in Asia but our work schedules conflicted pretty dramatically and we were unable to make it happen. But Japan in the New Year […]
About a month ago we gave a high-level talk about the threats to mobile devices at Source Seattle 2012. We talked (in the “Business Track”) about our experience developing the Practical ARM Exploitation course and also spoke anecdotally about our experiences reverse engineering and exploiting software on mobile devices and embedded systems. The talk was […]
Following our Blackhat 2012 training and talk we received a bunch of emails, tweets, and IMs asking one thing: “When are you going to offer this to the public again? I couldn’t make it to the BlackHat course.” With the exception of CanSecWest and BlackHat we’ve mostly been giving this (and customized versions of similar […]
Following our talk at Blackhat 2012 entitled “Practical ARM Exploitation”, we were honored to be asked to participate in a BlackHat press conference. After getting briefed by the Media Coordinator and Vincenzo Iozzo we summarized our talk and training in the simplest of terms to a room of reporters and journalists. After the press conference […]
Uhm….so apparently CTFs have REALLY blown up! As a founding member of Kenshoto, I remember how we pushed the envelope for CTFs (building automatic scoring systems, *actual* challenges, etc.) I was also the VJ for our first two years running, lugging my 500 DVDs with me to play my favorite little esoteric cyberpunk clips from […]
January 31, 2014 by s7ephen
9