72 Followers
102 Following
240 Posts
A decade of turning hacking from hobby to a career!
What I've been doing: Reverse Engineering, Malware Analysis, Embedded Security, Web Hacking, Pen-testing, Cryptography, Computational Complexity
WhoTal
WhatHacking
WhenHopefully, forever!
Blog?https://talsk.github.io/
Twitterhttps://twitter.com/TalSkverer

Almost 8 years since #PokémonGo launched and took the world by storm, it's time to tell the story of how I broke its anti-cheating mechanism together with a group of fellow hackers, all just to catch some new Pokémon

Part 1 is live on #TalTechTreks:
https://talsk.github.io/2024/04/06/Hacking-Pokemon-Go.html

Breaking Pokémon Go Anti-Cheating System (1)

Filling the Pokédex was never that easy

Tal's Tech Treks
Cool #riddle for those loving to identify patterns :)
For #Microsoft/#Azure pros in the crowed -
In the #OAuth guide in Microsoft's documentation (https://learn.microsoft.com/en-us/advertising/guides/authentication-oauth-consent) there's a link to install a sample #app.
In the past it installed the sample app no problem.
But today I got this #error. Does anyone have any idea what happened to it?
Request user consent - Microsoft Advertising API

Request user consent for authentication.

Today I sat and reviewed the huge security breach disclosed by the research team at wiz.io just a few days ago.

After shortly explaining what went wrong to lead to this incident, I suggest two actions organizations should employ in order to avoid making similar mistakes that could lead to such catastrophic consequences from happening in their own environments.

https://www.youtube.com/watch?v=ZAZvIEIjGYU

My talk from DEFCON is live on Youtube!
Honestly, I was very nervous - giving the talk to a huge audience consisting of extremely smart, talented hackers was frightening.
Yesterday, I anxiously watched this video, scared to see the outcome...

But to my surprise it's quite good!
There are still some bits where I stutter or mess up my English, but overall I look confident and was able to highlight what I wanted about the vulnerability and my vision for the future.
So I invite you to watch and let me know if you did!

DEF CON 31 - GhostToken Exploiting Google Cloud Platform to Create Unremovable Trojan Apps - Skverer

YouTube

This #defcon is going to be spoooooky~ 👻

In a little over 3 weeks, I'm going to deep dive into the #GhostToken 0-day vulnerability at @defcon, and the faults in the #OAuth protocol that led to it.

Hope to you see there, Aug 11, 12pm!