nt!PopGetDope 

93 Followers
176 Following
16 Posts

vulnerability researcher: basebands, fault injection, semiconductors, cats.
#road2sem

windbg rants @[email protected]

kd>.symfix / .reload / x nt!*Dope
twithttps://twitter.com/ntpopgetdope
bloghttps://ntoskrnl.re
readingModeling and Simulation for RF System Design - 2005

The blog series based on one of the silicon research projects I've been working on is up!

Some really beautiful die shots in here.

https://ioactive.com/accessory-authentication-part-1-3/

https://ioactive.com/accessory-authentication-part-2-3/

https://ioactive.com/accessory-authentication-part-3-3/

Accessory Authentication – Part 1/3 – IOActive

bought an SEM all the way from belgium! I can finally get angry at vacuum pumps & figure out what colour electrons are from the comfort of my living room 💸 (green as is money...)
AMD has published the source for their SEV PSP applet (4th gen EPYC), a vitally important step for allowing outside researchers to investigate the security of the encrypted virtual machine enclaves. https://github.com/amd/AMD-ASPFW
GitHub - amd/AMD-ASPFW

Contribute to amd/AMD-ASPFW development by creating an account on GitHub.

GitHub
flying visit from the ex-bird-site (?) finally confirmed C9730DK-11 panel is functional on xray unit! have some spicy pics🥳 Faxitron's SR software locks 'camera' & serial configs behind a hard-coded password 'NORTIXAF' lol very creative...
(many thanks to 8dot of @revspace)
https://pastebin.com/H3B0S6nQ full transcript / source for those that want to scare themselves regarding job security ;) also gave it some pretty complex program analysis & Z3 queries last night which were mostly correct....
ChatGPT Dead Store HexRays Example - Pastebin.com

Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.

Pastebin
this is not ok... 2022 and AI can use @HexRaySA's u-code better than 90% of 'reverse engineers'
@infosecdj haven't encountered that before on my units although mostly tested trace mode on an IWL, can have a look when I get home 

just stumbled upon a ton of photographs of the motorola semiconductor plant in austin, texas, taken in 1977. if you wanna see who makes your 6800, well here they are

https://flickr.com/photos/dboo/albums/72157694192306495/page2

reel #1a - austin, aspen, & new orleans, 1977-78

Austin, Texas Aspen, Colorado New Orleans, Louisiana 1977-78 Originally titled "Austin, TX", includes photographs of: - IC chips; various - Motorola semiconductor plant; Austin - Fox hunt; horses, riders, dogs; hunt breakfast; Woody Creek Hounds; various - Aerials, Aspen to Denver, en route to New Orleans; also return trip to Aspen - Southern Louisiana; Mississippi River, oil refineries, ships; train tracks; bayou; various - Family portraits, outside Lemle residence in New Orleans - Nightlife on Bourbon Street; French Quarter, New Orleans; various - Community Fashion Show; Aspen; social event; various - Christmas tree outing just north of Aspen, in the mountains near Lenado; various Part of an archival project, featuring the photographs of Nick DeWolf. Image numbers indicate reel number and image number. © the Nick DeWolf Foundation Image-use requests are welcome via flickrmail or nickdewolfphotoarchive [at] gmail [dot] com

Flickr
@infosecdj if they aren't showing the 'alert irruption' tamper status find yourself a copy of Ingedev! they're fun little units to write code for
@infosecdj Ingenico ICTxxx? I've decapped the MONEFT3X ICs from one of my irrupted units but my attempts at image stitching were awful  the 'booster' security coprocessor is where all the fun happens...