
Philippe Teuwen
@doegox
Followers
4K
Following
10K
Media
557
Statuses
5K
If you can't root it you don't own it. doegox infosec exchange
Brussels
Joined June 2011
The paper of the talk "EEPROM: It Will All End in Tears" by @herrmann1001 and myself is now available
1
38
117
RT @quarkslab: Sacre BLE! .Fuzzing Bluetooth Low Energy GATT and annoying your colleagues for fun and silence. Let Baptiste Boyer show you….
0
27
0
RT @herrmann1001: The RFID CTF is up and running. We increased with challenges from @doegox . Come and play!. @SAINTCON .
0
7
0
RT @hardwear_io: Why limit ourselves? 🤷♂️ Let's talk about making our tools compatible with a wider range of hardware! ✨. Join @virtualabs….
0
7
0
RT @hardwear_io: Think you know everything about #Bluetooth Low Energy (BLE)? Think again! 🔍 🤯. While BLE has been widely researched, only….
0
4
0
RT @quarkslab: Finding and chaining 4 vulns to exfiltrate encryption keys from the Android Keystore on Samsung series A* devices. Did you m….
0
109
0
Are you ready for @quarkslab hardware CTF challenges at @hardwear_io #hw_ioNL2024 and win prizes?.🗓️ October 24, 2024, 10:00 – October 25, 2024, 13:00.🌐
2
9
19
RT @quarkslab: The Cryptodifference Engine: An in-depth look at differential fuzzing for harvesting crypto bugs, by Célian Glénaz. https://….
0
24
0
RT @quarkslab: Dive into crypto-condor, our open-source test suite for cryptographic primitives by Julio Loayza Meneses! Perfect for ensuri….
0
17
0
RT @hardwear_io: 🔓 Unmasking the Flaws in MIFARE Classic Smart Cards: Uncover ongoing vulnerabilities in these widely used cards at hotels,….
0
14
0
RT @Lhree: [Revised] MIFARE Classic: exposing the static encrypted nonce variant (Philippe Teuwen)
eprint.iacr.org
MIFARE Classic smart cards, developed and licensed by NXP, are widely used but have been subjected to numerous attacks over the years. Despite the introduction of new versions, these cards have...
0
3
0
RT @quarkslab: Are "MIFARE-compatible" contactless cards not playing fair? That's what you may wonder after @doegox spotted some odd behavi….
0
38
0
RT @RGB_Lights: Chinese Backdoor Alert! Security enhancements on Mifare Classic cards used in hotels/business contain a supply chain backd….
0
241
0
RT @CayreRomain: After two years of hard work with @virtualabs , we are proud to release for DEFCON32 the first public version of WHAD, a w….
github.com
Wireless Hacking Devices Protocol client. Contribute to whad-team/whad-client development by creating an account on GitHub.
0
73
0
RT @quarkslab: It's day 1 of Black Hat USA #BHUSA 🎉. Today Quarkslab's engineer @max_r_b will talk about the chain of vulns affecting S….
0
12
0
RT @quarkslab: Dive deep into heap exploitation, glibc internals, and clever tricks with @philipp0x90 latest write-up on a challenging Hitc….
0
31
0
RT @passthesaltcon: VIDEOS & SLIDES .#pts24 is over, 🙏 to all attendees and speakers for this beautiful experience! . Due to @Ministraitor….
0
8
0
RT @hydrabus: Great talk on HydraDancer by QuarksLab(@quarkslab) / Thiébaud Fuchs( at @passthesaltcon #pts24.Check….
0
7
0
RT @quarkslab: Ever used a disassembler? Find out how @Phil_BARR3TT used one to recover a "deleted" ECU firmware update using branches.http….
0
16
0