For the last few years on this blog we’ve been publishing more and more about embedded systems. We started with “Disassembling Blackberry Apps” which (to this day) we still get emails about thanking us for the disassembler patches we released. A few years back as Ridley was getting into “hardware hacking” and attacking embedded systems […]
We spoke at Breakpoint 2012 in Melbourne, Australia. Whatta cool con. A researcher’s conference. It was small and highly relevant with great content. It was also a really great choice of venue (The Intercontinental). For the last decade or so I’ve used the term “rux” like people use the term “0wn”. I’ve also used the […]
“The sky above Las Vegas was the color of television, tuned to a dead channel…“ Ok it wasn’t. In fact it was bright, beautiful, sunny and hot as sh*t. Neal Stephenson did the keynote at BlackHat this year, so we felt we should sling the obligatory cyberpunk reference into this post….and because I (Ridley) am writing […]
Following our Blackhat 2012 training and talk we received a bunch of emails, tweets, and IMs asking one thing: “When are you going to offer this to the public again? I couldn’t make it to the BlackHat course.” With the exception of CanSecWest and BlackHat we’ve mostly been giving this (and customized versions of similar […]
Following our talk at Blackhat 2012 entitled “Practical ARM Exploitation”, we were honored to be asked to participate in a BlackHat press conference. After getting briefed by the Media Coordinator and Vincenzo Iozzo we summarized our talk and training in the simplest of terms to a room of reporters and journalists. After the press conference […]
Uhm….so apparently CTFs have REALLY blown up! As a founding member of Kenshoto, I remember how we pushed the envelope for CTFs (building automatic scoring systems, *actual* challenges, etc.) I was also the VJ for our first two years running, lugging my 500 DVDs with me to play my favorite little esoteric cyberpunk clips from […]
Another conference has come and gone. Sometimes it seems that the annual conference schedule is the metronome to which the Infosec world paces itself. The coming and going of conferences is the only consistency in this idiosyncratic industry full of neurosis and theatrics. This year’s CanSecWest held true to form and was the stage for […]
As we have announced in other blogposts we’ve been researching mobile platforms quite a bit (specifically those that use the ARM microprocessor). We compiled all of our notes on ARM reverse engineering and ARM exploitation and built a course called “Practical ARM Exploitation” that we will be publicly debuting this coming week at CanSecWest. The […]
For most of my career as a software developer/security researcher I’ve romanticized ‘hardware hacking’. In my late teens and early twenties as I was learning about software development and software security I would occasionally buy Nuts and Volts from Microcenter and read Karl Lunt‘s Amateur Robotics column. Having devoured William Gibson‘s oeuvre in my late […]
This summer Beans had the honor of speaking at SummerC0n in NYC. At SummerCon 2011 we debut’d a talk on Hardware Reverse Engineering with the help of Rajendra Umadras of Intrepidus Group. (This talk was given later in the summer at Recon 2011). SummerC0n is one of the older (maybe one of the oldest) “grassroots” infosec conferences with […]
July 31, 2013 by s7ephen
0