https://mastodon.social/@antoniovazquezblanco
@antonvblanco
Followers
233
Following
445
Media
5
Statuses
305
Congratz to my friend @antonvblanco - Liberating Bluetooth on the ESP32 https://t.co/lR1C7pI6U5
1
1
5
Transparency and deep access to IoT hardware. ⚙️🔍 On December 27, @antonvblanco (@Tarlogic Innovation) will present at #39c3 a reverse engineering research project on the ESP32 chip. 📍 Hamburg ⏰ 13:50–14:30 #Bluetooth
0
1
8
Meetings You Didn’t Plan, But We Did In this post, @ineesdv breaks down how calendar event processing in Outlook and Gmail can be abused to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction ➡️Read more: https://t.co/7RApljHair
0
21
20
Ghidra 12.0 has been released! https://t.co/4kzq1HuTsO
github.com
What's New Change History Getting Started SHA-256: af43e8cfb2fa4490cf6020c3a2bde25c159d83f45236a0542688a024e8fc1941
2
45
207
✨A quick look back at something special from #GreHack25 Paged Out! was in this year’s goodies, a free, one-article-per-page publication covering programming, security and more. Fast to read, fun to explore, packed with content! Check them out here : https://t.co/xlmiYUtTlT 😄
1
5
12
🔎 Extract firmware, recover keys, and execute code. This is what hostile actors can achieve with physical access to devices with hardware security deficiencies. @antonvblanco outlines the key steps in a security analysis of two devices. https://t.co/3GomPBKfR2
tarlogic.com
Reverse engineering of Dahua NVR-XVR devices revealed weaknesses in the implementation of security mechanisms
0
1
3
🔎 Extraer firmware, recuperar claves y ejecutar código. Esto es lo que pueden conseguir atacantes con acceso físico a dispositivos con deficiencias de seguridad hardware. @antonvblanco disecciona un análisis de seguridad de dos dispositivos 👇🏻 https://t.co/qsvObRUMP4
tarlogic.com
En este artículo Antonio Vázquez Blanco analiza un proceso de ingeniería inversa de dispositivos Dahua NVR-XVR
0
1
2
😶🌫️📲 The moment you step in, you’re already surrounded by a cloud of whispering Bluetooth signals. @XenoKovah at #hw_ioNL2025 is hunting them down with #Blue2thprinting, revealing who built them, what clip they carry, and what they’re trying to do. 👉 https://t.co/0RzHkiRC75
0
1
4
@XenoKovah has 140 slides 🤯with Reverse Engineering Realtek RTL87618 * Bluetooth chips …. #hw_ioNL2025
1
2
9
Full room to understand how #Realtek #Bluetooth chips: ROM-"patch"ing firmware update mechanism works by @XenoKovah #hw_io #hw_ioNL2025
0
3
7
🚨 Nuestro compañero @antonvblanco está desgranando en @BlackAlpsConf cómo es posible obtener acceso sin restricciones a dispositivos de videovigilancia de Dahua mediante técnicas avanzadas de hardware hacking e ingeniería inversa.
0
1
2
🚨 Our colleague @antonvblanco is explaining at @BlackAlpsConf how it's possible to gain unrestricted access to Dahua video surveillance devices using advanced hardware hacking and reverse engineering techniques.
0
1
3
Class is in full swing as @VeronicaKovah @XenoKovah guide us through the BLE universe like hackers on a safari 🦁📲💻 At #hw_ioNL2025 they are dissecting every layer of the protocol stack—bottom to top, no bits left behind Know More: https://t.co/rxAIlKboRl
#Bluetoothsecurity
0
2
6
Vuelve el congreso de referencia en ciberseguridad de Euskadi > La IX edición del EuskalHack Security Congress llega a Donostia > 19 y 20 de junio de 2026 #SaveTheDate #Hacking #ESCIX
https://t.co/qqvTO472W0
0
5
8
Analisis basico de Firmware & Reversing con Ghidra - Antonio Vazquez Blanco @antonvblanco (2025) https://t.co/I512OByM1h Gracias a todos los que participais en nuestros cursos sois quienes haceis posible todo esto!!
0
3
5
Real ones post their slides before their talk (or at least very shortly thereafter) ;) Slides & materials for HWIO NL talk later this week: “Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes” https://t.co/6uvsLk2NMc
darkmentor.com
We hold this truth to be self-evident: SUFFERING BUILDS STRENGTH! In this talk I will walk you through the trials, tribulations, and triumph(!) of the worst debugging setup I've ever hacked together,...
0
22
69
🧵I created a complimentary repo to Antonio's, that's focused specifically on common security-relevant Bluetooth HCI Vendor-Specific Commands and getting them documented in a useful machine-readable way (Scapy definitions for now)
github.com
This repository contains information about Bluetooth HCI Vendor-Specific Commands (VSCs) which are known to be security-relevant. - darkmentorllc/BT_Security_VSC_DB
🧵A new git repo by @antonvblanco is collecting info about Bluetooth USB dongles. If you have one laying around, please contribute information about it… https://t.co/6CadMuHqyO
1
1
3
I am unable to further debug this... I also haven't found schematics for that part of the board so I will stop there. If anyone has a donor Microsoft Surface Pro 4 board that does not work I would consider doing some schematics for it.
0
0
0