
Marc Newlin
@marcnewlin
Followers
3K
Following
3K
Media
169
Statuses
1K
Hacker. Engineer. Burner. I'm a DARPA challenge junkie, and recently acquired a fourth pair of pants. #BlackLivesMatter.
Los Angeles, CA
Joined May 2010
I decided to release the PoC scripts ahead of my ShmooCon talk. Happy Hacking :)
github.com
Contribute to marcnewlin/hi_my_name_is_keyboard development by creating an account on GitHub.
14
68
219
Thank you to the amazing @GSGLabs team for building Cynthion and enabling the start of my FPGA journey. I'm not sure where this hackery will lead, but I have the Cynthion talking to an ADF7242 over SPI and SPORT, and I think some fun timing attacks are just around the corner :)
0
1
17
RT @embeddedsec: I’ll also be recapping my and @marcnewlin’s escapades in the Spectrum Collaboration Challenge on a panel about @DARPA comp….
0
3
0
You can also read flash over Bluetooth. Here's a PoC that demonstrates this on the Apple Magic Keyboard A2450.
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
1
8
22
Apple HID devices have this neat feature where you can read the contents of flash over USB. Here's a PoC for keyboards A1843, A2449, A2450, A2520, mouse A1657, and TV remote A2854. Happy Hacking :).
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
3
80
301
RT @antriksh_s: Happy to see @marcnewlin on @nullcon stage with his new bugs which got patched last week by Apple & Google ! .
0
2
0
RT @trufflesec: ⌨️ There's a keyboard button in Linux that can sometimes dump root memory when pressed. 😅 It's made worse with @marcnewli….
0
5
0
I didn't want Apple to feel left out, so I also found CVE-2024-23277, which is another Bluetooth keystroke-injection bug affecting macOS and iOS (fixed in macOS 14.4 and iOS 17.4).
support.apple.com
This document describes the security content of macOS Sonoma 14.4.
1
30
102
RT @nullcon: We look forward to hearing more about your #research “ unauthenticated Bluetooth keystroke-injection vulnerabilities “ next w….
nullcon.net
Please check the URL
0
2
0
Google just patched another critical-severity Bluetooth bug I found in Android (CVE-2024-23717). This one is similar to CVE-2023-45866, only it exploits a different path in the pairing state-machine. More details and PoC coming next Friday at @NullCon :)
source.android.com
1
43
160
RT @iiiikarus: I've just tested @marcnewlin's Bluetooth attack against my Google Pixel 3a. It just works! Really scary stuff! . Even worse,….
0
4
0
Here are the slides from my ShmooCon talk:
github.com
Contribute to marcnewlin/hi_my_name_is_keyboard development by creating an account on GitHub.
0
11
44
More details about the Bluetooth bugs I am presenting at ShmooCon, including the Magic Keyboard bugs that landed this morning. Happy Hacking :)
github.com
SkySafe Miscellaneous Reverse Engineering Blog. Contribute to skysafe/reblog development by creating an account on GitHub.
2
36
103
Props to Microsoft for landing a fix ahead of my @ShmooCon talk, even though I disclosed to MS ~2 months after the other vendors. Bluetooth keystroke-injection PoCs drop at ~3pm ET on Saturday for macOS, iOS, Android and Linux (CVE-2023-45866), and Windows (CVE-2024-21306).
0
7
40
So I got a new TV today, and it's awesome except that it supports BT forced pairing & keystroke injection (CVE-2023-45866). I think more affected devices will probably surface after I release PoC code at @shmoocon :).
2
2
19