nt!PopGetDope 

93 Followers
176 Following
16 Posts

vulnerability researcher: basebands, fault injection, semiconductors, cats.
#road2sem

windbg rants @[email protected]

kd>.symfix / .reload / x nt!*Dope
twithttps://twitter.com/ntpopgetdope
bloghttps://ntoskrnl.re
readingModeling and Simulation for RF System Design - 2005

The blog series based on one of the silicon research projects I've been working on is up!

Some really beautiful die shots in here.

https://ioactive.com/accessory-authentication-part-1-3/

https://ioactive.com/accessory-authentication-part-2-3/

https://ioactive.com/accessory-authentication-part-3-3/

Accessory Authentication – Part 1/3 – IOActive

bought an SEM all the way from belgium! I can finally get angry at vacuum pumps & figure out what colour electrons are from the comfort of my living room 💸 (green as is money...)
AMD has published the source for their SEV PSP applet (4th gen EPYC), a vitally important step for allowing outside researchers to investigate the security of the encrypted virtual machine enclaves. https://github.com/amd/AMD-ASPFW
GitHub - amd/AMD-ASPFW

Contribute to amd/AMD-ASPFW development by creating an account on GitHub.

GitHub
flying visit from the ex-bird-site (?) finally confirmed C9730DK-11 panel is functional on xray unit! have some spicy pics🥳 Faxitron's SR software locks 'camera' & serial configs behind a hard-coded password 'NORTIXAF' lol very creative...
(many thanks to 8dot of @revspace)
https://pastebin.com/H3B0S6nQ full transcript / source for those that want to scare themselves regarding job security ;) also gave it some pretty complex program analysis & Z3 queries last night which were mostly correct....
ChatGPT Dead Store HexRays Example - Pastebin.com

Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.

Pastebin
this is not ok... 2022 and AI can use @HexRaySA's u-code better than 90% of 'reverse engineers'

just stumbled upon a ton of photographs of the motorola semiconductor plant in austin, texas, taken in 1977. if you wanna see who makes your 6800, well here they are

https://flickr.com/photos/dboo/albums/72157694192306495/page2

reel #1a - austin, aspen, & new orleans, 1977-78

Austin, Texas Aspen, Colorado New Orleans, Louisiana 1977-78 Originally titled "Austin, TX", includes photographs of: - IC chips; various - Motorola semiconductor plant; Austin - Fox hunt; horses, riders, dogs; hunt breakfast; Woody Creek Hounds; various - Aerials, Aspen to Denver, en route to New Orleans; also return trip to Aspen - Southern Louisiana; Mississippi River, oil refineries, ships; train tracks; bayou; various - Family portraits, outside Lemle residence in New Orleans - Nightlife on Bourbon Street; French Quarter, New Orleans; various - Community Fashion Show; Aspen; social event; various - Christmas tree outing just north of Aspen, in the mountains near Lenado; various Part of an archival project, featuring the photographs of Nick DeWolf. Image numbers indicate reel number and image number. © the Nick DeWolf Foundation Image-use requests are welcome via flickrmail or nickdewolfphotoarchive [at] gmail [dot] com

Flickr

Happy to announce the release of swSIM and swICC by Tomasz Lisowski, two open source repositories to enable SIM card emulation: https://github.com/tomasz-lisowski/swicc & https://github.com/tomasz-lisowski/swsim.

Among others, we attached the emulator to a physical phone via SIMTrace2 and interact with test networks!

GitHub - tomasz-lisowski/swicc: A framework for creating smart cards (ICC-based cards with contacts).

A framework for creating smart cards (ICC-based cards with contacts). - GitHub - tomasz-lisowski/swicc: A framework for creating smart cards (ICC-based cards with contacts).

GitHub

DSi ARM9 bootrom dumped!

SHA512 = 8449d45215f28a6cebd9557ec0ed5180ba4d8474454c3ef300644e2a4bb4654d766a9075cc13b5d74fbaa75b3de8cf5604ed35a6aad6c39d40fe097483322b1c

​ finally seems to be flat-lining, trying out this new mastodon thing...

#introduction, for peeps I've not met prior via my bird app handle @ntpopgetdope. I'm a vulnerability researcher that's worked in the industry professionally for >4yrs

My background stems from an obsession with #windowsinternals & the vastly underrated 'HAL.dll'. These days I'm into baseband vuln research working on obscure hardware, architectures & attacks. Love chatting about all things:
#fpga #uefi #baseband #faultinjection #openhardware #embeddedelectronics #pcbdesign and #cats !

Currently with the @InterruptLabs crew, a boutique vulnerability research & exploit development firm in the UK.