| Previously on | @doegox |
| Wiki | https://wiki.yobi.be/index.php/User:PhilippeTeuwen |
| Github | https://github.com/doegox |
| Keybase | https://doegox.keybase.pub/mastodon.html |
| @doegox |
| Previously on | @doegox |
| Wiki | https://wiki.yobi.be/index.php/User:PhilippeTeuwen |
| Github | https://github.com/doegox |
| Keybase | https://doegox.keybase.pub/mastodon.html |
| @doegox |
ใใใซใกใฏ Tokyo!
"Of all things, I liked bugs best."
โ Nikola Tesla
Quarkslab is happy to participate in Pwn2Own
Automotive and tomorrow we will try to demonstrate a RCE on an Electric Vehicle Charger on stage.
Nikola enlight us, Murphy stay home!
https://www.zerodayinitiative.com/blog/2025/1/21/pwn2own-automotive-2025-the-full-schedule
ใใใซใกใฏ and welcome to the second annual Pwn2Own Automotive competition. We are at Automotive World in Tokyo, and weโve brought together some of the best researchers in the world to test the latest automotive components. We had our random drawing for the order of events earlier today, and from th
Had a blast again this year helping running the Hardware CTF at #hardwear_io with @doegox @Phil_BARR3TT and Jilles Groenendijk! It's always super cool to see people breaking stuff we've built for this CTF ๐คฉ. See you next year !
Are "MIFARE-compatible" contactless cards not playing fair? That's what you may wonder after
@doegox spotted some odd
behavior.
Curiosity led to experiments that resulted in devising a new attack technique that uncovered some backdoors, and here we are ๐
The RFID hacking spirit lives on!
https://blog.quarkslab.com/mifare-classic-static-encrypted-nonce-and-backdoors.html
We studied the most secure static encrypted nonce variant of "MIFARE Classic compatible" cards -- meant to resist all known card-only attacks -- and developed new attacks defeating it, uncovering a hardware backdoor in the process. And that's only the beginning...