https://mastodon.social/@antoniovazquezblanco Profile
https://mastodon.social/@antoniovazquezblanco

@antonvblanco

Followers
233
Following
445
Media
5
Statuses
305

Joined January 2022
Don't wanna be here? Send us removal request.
@therealdreg
Dreg
9 days
Congratz to my friend @antonvblanco - Liberating Bluetooth on the ESP32 https://t.co/lR1C7pI6U5
1
1
5
@MacroWorld21
A. I. (Macro Photography)🔬
16 days
@memechaotic Still 98% battery left 😌
0
1
7
@Tarlogic
Tarlogic
18 days
Transparency and deep access to IoT hardware. ⚙️🔍 On December 27, @antonvblanco (@Tarlogic Innovation) will present at #39c3 a reverse engineering research project on the ESP32 chip. 📍 Hamburg ⏰ 13:50–14:30 #Bluetooth
0
1
8
@BlackArrowSec
BlackArrow
19 days
Meetings You Didn’t Plan, But We Did In this post, @ineesdv breaks down how calendar event processing in Outlook and Gmail can be abused to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction ➡️Read more: https://t.co/7RApljHair
0
21
20
@GrehackConf
GreHack
1 month
✨A quick look back at something special from #GreHack25 Paged Out! was in this year’s goodies, a free, one-article-per-page publication covering programming, security and more. Fast to read, fun to explore, packed with content! Check them out here : https://t.co/xlmiYUtTlT 😄
1
5
12
@Tarlogic
Tarlogic
1 month
🔎 Extract firmware, recover keys, and execute code. This is what hostile actors can achieve with physical access to devices with hardware security deficiencies. @antonvblanco outlines the key steps in a security analysis of two devices. https://t.co/3GomPBKfR2
Tweet card summary image
tarlogic.com
Reverse engineering of Dahua NVR-XVR devices revealed weaknesses in the implementation of security mechanisms
0
1
3
@TarlogicES
TarlogicES
1 month
🔎 Extraer firmware, recuperar claves y ejecutar código. Esto es lo que pueden conseguir atacantes con acceso físico a dispositivos con deficiencias de seguridad hardware. @antonvblanco disecciona un análisis de seguridad de dos dispositivos 👇🏻 https://t.co/qsvObRUMP4
Tweet card summary image
tarlogic.com
En este artículo Antonio Vázquez Blanco analiza un proceso de ingeniería inversa de dispositivos Dahua NVR-XVR
0
1
2
@hardwear_io
hardwear.io
2 months
😶‍🌫️📲 The moment you step in, you’re already surrounded by a cloud of whispering Bluetooth signals. @XenoKovah at #hw_ioNL2025 is hunting them down with #Blue2thprinting, revealing who built them, what clip they carry, and what they’re trying to do. 👉 https://t.co/0RzHkiRC75
0
1
4
@hardwear_io
hardwear.io
2 months
@XenoKovah has 140 slides 🤯with Reverse Engineering Realtek RTL87618 * Bluetooth chips …. #hw_ioNL2025
1
2
9
@hardwear_io
hardwear.io
2 months
Full room to understand how #Realtek #Bluetooth chips: ROM-"patch"ing firmware update mechanism works by @XenoKovah #hw_io #hw_ioNL2025
0
3
7
@TarlogicES
TarlogicES
2 months
🚨 Nuestro compañero @antonvblanco está desgranando en @BlackAlpsConf cómo es posible obtener acceso sin restricciones a dispositivos de videovigilancia de Dahua mediante técnicas avanzadas de hardware hacking e ingeniería inversa.
0
1
2
@Tarlogic
Tarlogic
2 months
🚨 Our colleague @antonvblanco is explaining at @BlackAlpsConf how it's possible to gain unrestricted access to Dahua video surveillance devices using advanced hardware hacking and reverse engineering techniques.
0
1
3
@hardwear_io
hardwear.io
2 months
Class is in full swing as @VeronicaKovah @XenoKovah guide us through the BLE universe like hackers on a safari 🦁📲💻 At #hw_ioNL2025 they are dissecting every layer of the protocol stack—bottom to top, no bits left behind Know More: https://t.co/rxAIlKboRl #Bluetoothsecurity
0
2
6
@EuskalHack
EuskalHack
2 months
Vuelve el congreso de referencia en ciberseguridad de Euskadi > La IX edición del EuskalHack Security Congress llega a Donostia > 19 y 20 de junio de 2026 #SaveTheDate #Hacking #ESCIX https://t.co/qqvTO472W0
0
5
8
@therealdreg
Dreg
2 months
Analisis basico de Firmware & Reversing con Ghidra - Antonio Vazquez Blanco @antonvblanco (2025) https://t.co/I512OByM1h Gracias a todos los que participais en nuestros cursos sois quienes haceis posible todo esto!!
0
3
5
@XenoKovah
Xeno Kovah
2 months
Real ones post their slides before their talk (or at least very shortly thereafter) ;) Slides & materials for HWIO NL talk later this week: “Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes” https://t.co/6uvsLk2NMc
Tweet card summary image
darkmentor.com
We hold this truth to be self-evident: SUFFERING BUILDS STRENGTH! In this talk I will walk you through the trials, tribulations, and triumph(!) of the worst debugging setup I've ever hacked together,...
0
22
69
@XenoKovah
Xeno Kovah
2 months
🧵I created a complimentary repo to Antonio's, that's focused specifically on common security-relevant Bluetooth HCI Vendor-Specific Commands and getting them documented in a useful machine-readable way (Scapy definitions for now)
Tweet card summary image
github.com
This repository contains information about Bluetooth HCI Vendor-Specific Commands (VSCs) which are known to be security-relevant. - darkmentorllc/BT_Security_VSC_DB
@XenoKovah
Xeno Kovah
2 months
🧵A new git repo by @antonvblanco is collecting info about Bluetooth USB dongles. If you have one laying around, please contribute information about it… https://t.co/6CadMuHqyO
1
1
3
@antonvblanco
https://mastodon.social/@antoniovazquezblanco
2 months
I am unable to further debug this... I also haven't found schematics for that part of the board so I will stop there. If anyone has a donor Microsoft Surface Pro 4 board that does not work I would consider doing some schematics for it.
0
0
0