Andrés Blanco
@6e726d
Followers
864
Following
2K
Media
123
Statuses
1K
I enjoy playing with hardware and network protocols, especially with IEEE 802.11. @[email protected]
Buenos Aires
Joined April 2010
Por primera vez en más de 40 años, ¡traemos “WarGames” de vuelta a la pantalla grande! 🤯 🍿 Te invitamos a revivir esta joyita del cine que marcó a toda una generación hacker. Y además, empezamos juntos la cuenta regresiva para la EKO 2025, obvio. 📅 ¿Cuándo? El viernes 22 de
0
8
27
Wanna learn how “Wi-Fi” protocols are implemented? Here are 4 open-source projects from full AP stacks to research PHYs: 1. bladeRF-wiphy 2. openwifi 3. gr-WiFi 4. gr-ieee802-11
5
68
502
Just dropped a blog post on reproducing a known voltage glitching attack to bypass APPROTECT on the nRF52840! 😎 Spent hours soldering & debugging to get it right. Not novel, but a messy journey—check it out:
matiassoler.com
A detailed walkthrough of bypassing APPROTECT on the nRF52840 using voltage glitching with a ChipWhisperer
2
30
78
Hello friends. Check out this awesome and unique role that just opened up on my team in SEAR. Wanna secure Apple silicon, ROMs, iBoot, and more?
7
53
177
XBOW is now the top hacker in the US on @Hacker0x01 !
2
5
24
We're piloting a new invite-only bug bounty for Quest devices and seeking 1-3 experienced researchers (AOSP experience a plus) for a 6-month participation. The scope will focus on RCE/EOP vulns & exploits. There will be special incentives on top of the regular bounty payouts,
docs.google.com
Thank you for your interest in our invite-only bug bounty program. We will review applications as they are received and contact qualified candidates promptly. Please note that only a limited number...
1
9
67
The complexity of the IEEE 802.11 protocol standard continues to increase. In my view, overly complex protocol standards often create more problems than they solve.
New version of the IEEE 802.11 standard that underpins Wi-Fi was has been released. A total of 5969 pages! The number of pages clearly keeps increasing. That includes more features to defend networks, but also more features to potentially abuse.
0
0
1
https://t.co/zPB6ecduf3 working with binaryninja on an single ASAN output, of a sophisticated framework.
3
34
257
Vibe debugging via MCP for WinDBG crash analysis: https://t.co/I1YC2029Rr Relevant blog: https://t.co/EJDtW4ElJ1
github.com
Model Context Protocol for WinDBG. Contribute to svnscha/mcp-windbg development by creating an account on GitHub.
1
24
60
We’re hiring Vulnerability Researchers at @infosectcbr that specialise in Linux, OS kernels, Android, and embedded/IoT. With a world class hardware lab, come join our friendly and collaborative team, focusing on research against leading technologies. DM for details.
3
41
166
Also new: Kernel Cache support! Load kernel images from iOS/macOS and analyze cross-image symbols!
0
1
9
DYLD improvements: • Much faster loading (4.5 min → 15 sec in one sample!) • Load images + dependencies with one click • Better Obj-C + msgSend support • Symbol demangling via LLVM • Pointer resolution + stability rewrites • Refreshed docs for triage workflows
1
1
9
Announcing Binary Ninja 5.0! Today we're proud to announce the release of Binary Ninja 5.0 (Gallifrey). Here's some highlights: Union Support, Dyld Share Cache & Kernel Cache, Firmware Ninja, Auto Stack Arrays, Stack Structure Type Propagation, and so much more. Check out the
5
50
170
The final episode of our new video series for Meta Quest Firmware Analysis is up! 😎 We started right from the basics and in this episode, we go through a real-world demo of reversing the firmware on a Quest 2 device. https://t.co/96K8f0gVMa
0
3
17
It's known that we got hired by Raspberry Pi to try to hack the RP2350 - and now, as the hacking challenge has come to an end, we can also share that we succeeded in doing so!
Last year, @Raspberry_Pi hired us to test the security of the RP2350 - and using electro-magnetic fault-injection we were able to successfully bypass the OTP security measures! This allowed us to read and modify the OTP locks, essentially bypassing the RP2350 secure-boot.
4
40
452
Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In contrast, we aim to find and fix them. Read the results of our RP2350 Hacking Challenge: https://t.co/g3ZOPw8Rqp
15
200
920
mitmproxy 11.1 is out! 🥳 We now support *Local Capture Mode* on Windows, macOS, and - new - Linux! This allows users to intercept local applications even if they don't have proxy settings. Details at https://t.co/0i7mQoDyKV. Super proud of this team effort. 😃
4
98
402
Does anyone know someone that had a good experience with @Airbnb support or @AirbnbHelp? Apparently the guest is not important for the business? Not having heating during winter is not an issue for them…
1
0
0
Don't Panic! The answer: version 4.2 of Binary Ninja, is now available. Check out the release blog post which shows: - New PseudoC/Python/Rust decompilation - DLYD Shared Cache Support - WARP Signature System And a ton of other impactful features. https://t.co/wHVej43H6x
2
35
134