marcnewlin Profile Banner
Marc Newlin Profile
Marc Newlin

@marcnewlin

Followers
3K
Following
3K
Media
169
Statuses
1K

Hacker. Engineer. Burner. I'm a DARPA challenge junkie, and recently acquired a fourth pair of pants. #BlackLivesMatter.

Los Angeles, CA
Joined May 2010
Don't wanna be here? Send us removal request.
@marcnewlin
Marc Newlin
2 years
I decided to release the PoC scripts ahead of my ShmooCon talk. Happy Hacking :)
Tweet card summary image
github.com
Contribute to marcnewlin/hi_my_name_is_keyboard development by creating an account on GitHub.
14
68
219
@marcnewlin
Marc Newlin
1 year
Thank you to the amazing @GSGLabs team for building Cynthion and enabling the start of my FPGA journey. I'm not sure where this hackery will lead, but I have the Cynthion talking to an ADF7242 over SPI and SPORT, and I think some fun timing attacks are just around the corner :)
Tweet media one
Tweet media two
0
1
17
@marcnewlin
Marc Newlin
1 year
RT @embeddedsec: I’ll also be recapping my and @marcnewlin’s escapades in the Spectrum Collaboration Challenge on a panel about @DARPA comp….
0
3
0
@marcnewlin
Marc Newlin
1 year
You can also read flash over Bluetooth. Here's a PoC that demonstrates this on the Apple Magic Keyboard A2450.
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
1
8
22
@marcnewlin
Marc Newlin
1 year
Apple HID devices have this neat feature where you can read the contents of flash over USB. Here's a PoC for keyboards A1843, A2449, A2450, A2520, mouse A1657, and TV remote A2854. Happy Hacking :).
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
3
80
301
@marcnewlin
Marc Newlin
1 year
RT @antriksh_s: Happy to see @marcnewlin on @nullcon stage with his new bugs which got patched last week by Apple & Google ! .
0
2
0
@marcnewlin
Marc Newlin
1 year
RT @trufflesec: ⌨️ There's a keyboard button in Linux that can sometimes dump root memory when pressed. 😅 It's made worse with @marcnewli….
0
5
0
@marcnewlin
Marc Newlin
1 year
I didn't want Apple to feel left out, so I also found CVE-2024-23277, which is another Bluetooth keystroke-injection bug affecting macOS and iOS (fixed in macOS 14.4 and iOS 17.4).
support.apple.com
This document describes the security content of macOS Sonoma 14.4.
1
30
102
@marcnewlin
Marc Newlin
1 year
RT @nullcon: We look forward to hearing more about your #research “ unauthenticated Bluetooth keystroke-injection vulnerabilities “ next w….
nullcon.net
Please check the URL
0
2
0
@marcnewlin
Marc Newlin
1 year
Google just patched another critical-severity Bluetooth bug I found in Android (CVE-2024-23717). This one is similar to CVE-2023-45866, only it exploits a different path in the pairing state-machine. More details and PoC coming next Friday at @NullCon :)
source.android.com
1
43
160
@marcnewlin
Marc Newlin
2 years
RT @iiiikarus: I've just tested @marcnewlin's Bluetooth attack against my Google Pixel 3a. It just works! Really scary stuff! . Even worse,….
0
4
0
@marcnewlin
Marc Newlin
2 years
More details about the Bluetooth bugs I am presenting at ShmooCon, including the Magic Keyboard bugs that landed this morning. Happy Hacking :)
Tweet card summary image
github.com
SkySafe Miscellaneous Reverse Engineering Blog. Contribute to skysafe/reblog development by creating an account on GitHub.
2
36
103
@marcnewlin
Marc Newlin
2 years
Props to Microsoft for landing a fix ahead of my @ShmooCon talk, even though I disclosed to MS ~2 months after the other vendors. Bluetooth keystroke-injection PoCs drop at ~3pm ET on Saturday for macOS, iOS, Android and Linux (CVE-2023-45866), and Windows (CVE-2024-21306).
0
7
40
@marcnewlin
Marc Newlin
2 years
The Android fix for CVE-2023-45866 broke Fast Pair and Nearby Share (per a conversation I had with Google). I haven't attempted to characterize what they re-architected, but it's interesting to see the apparent move away from Nearby Share.
0
1
5
@marcnewlin
Marc Newlin
2 years
Here's what CVE-2023-45866 looks like on macOS 13.3 (fixed in 14.2).
1
22
115
@marcnewlin
Marc Newlin
2 years
CVE-2023-45866 has been around for a while. This is what it looks like when you time travel to 2013 and target a phone running Android 4.2.2.
1
7
56
@marcnewlin
Marc Newlin
2 years
2
2
30
@marcnewlin
Marc Newlin
2 years
So I got a new TV today, and it's awesome except that it supports BT forced pairing & keystroke injection (CVE-2023-45866). I think more affected devices will probably surface after I release PoC code at @shmoocon :).
2
2
19