subreption Profile Banner
Subreption LLC Profile
Subreption LLC

@subreption

Followers
675
Following
170
Media
11
Statuses
221

We break things, build things... sometimes before anyone else. Defensive & offensive security R&D and skunkworks projects since ~2006. Silent until we are not.

Ring ≤ 0 | (US, MENA, EU)
Joined November 2011
Don't wanna be here? Send us removal request.
@subreption
Subreption LLC
6 months
Subreption releases research exposing critical security flaws in FIPS/Common Criteria certified enterprise network switches. ( https://t.co/VQ6kMiK9uq) FLAPPYSWITCH abuses CVE-2024-50604, CVE-2024-50605, CVE-2024-50606 and CVE-2024-50607, for breaking out of the management "cli",
Tweet media one
1
0
68
@subreption
Subreption LLC
25 days
End of Sales is not End of Life. This is one understated PSA from law enforcement that will go sadly unnoticed and repeat for a few iterations well into the future. FLAPPYBIRD lives on!
@FBI
FBI
26 days
The FBI has released a PSA warning that Russian FSB cyber actors are targeting end-of-life networking devices across critical infrastructure sectors. Click for technical details and further information on the FSB Center 16 unit conducting this activity: https://t.co/OZohNt0sDQ
Tweet media one
0
0
0
@FBI
FBI
26 days
The FBI has released a PSA warning that Russian FSB cyber actors are targeting end-of-life networking devices across critical infrastructure sectors. Click for technical details and further information on the FSB Center 16 unit conducting this activity: https://t.co/OZohNt0sDQ
Tweet media one
207
614
1K
@subreption
Subreption LLC
6 months
FLAPPYSWITCH against a remote Ruckus ICX switch running latest 9.x firmware, in FIPS/Common Criteria mode, gaining code execution and persistence in under 20 seconds. Thanks to our collaborating researcher for both excellent code and comedy! #physicalaccessonly #notreally
0
0
0
@subreption
Subreption LLC
6 months
Pending a more formal announcement, we are excited to introduce you to our research since fall 2024 into enterprise network security. Here comes FLAPPYSWITCH. "What can an incident like Salt Typhoon do to telco infrastructure at a hardware level?" needn't be an academic question
0
1
4
@subreption
Subreption LLC
7 months
7eb03d851c7af7c35b102a024de9d4e94ec693fb90c8f7bbdb05db8c89aa2162 625a4f85d1f648f4f447c9f15b7456c245bc6289604e5336b6f5b11211037707 d91e1b95253651fae4a97128a65101d742783848fc4eef4308767d77cf9c5626 c1330c4c4935d95d9c7af194c6c4312f8849c4c4aaef4178bb88418ec77029ad
0
0
0
@subreption
Subreption LLC
8 months
We got hit with Beg Bounty shenanigans on New Year's! Read the story at https://t.co/CepccEFwEx and https://t.co/UJPRM4doVG Homage to @troyhunt of @haveibeenpwned fame. Special thanks to @ThinkstCanary. Happy 2025! May this new year bring our friends happiness and a plethora of
0
0
1
@subreption
Subreption LLC
9 months
Added a set of CVEs currently reported and in process of disclosure and remediation/mitigation: CVE-2024-50604, CVE-2024-50605, CVE-2024-50606, CVE-2024-50607, in Ruckus Networks/CommScope products. Underhyped research during the #SaltTyphoon aftermath! A throwback at
1
0
1
@subreption
Subreption LLC
1 year
Releasing hackrf_sweeper (reimplementation of HackRF's hackrf_sweep as a library), along demo applications (including a ZMQ+CURVE client and publisher of FFT bins for remote sweeping). https://t.co/VV21xEk6sz
Tweet media one
0
0
2
@subreption
Subreption LLC
1 year
Finally proper YARA support for Ghidra without the suck: GhidraYara ( https://t.co/klAK2qC7I7). Analyzer extension + plugin for rule generation and management, rolled up in one. More features to come, including integration with ProgramDB (for in-DB storage of rules and artifacts).
Tweet media one
0
0
0
@subreption
Subreption LLC
1 year
We have recently released a few things: hackrf_sweeper (hackrf_sweep properly reimplemented as a library) and GhidraYara (including refreshed Java bindings for YARA). https://t.co/VV21xEk6sz
Tweet card summary image
github.com
A direct Yara/Ghidra integration, finally YARA for Ghidra without the suck! - subreption/ghidra_yara
0
0
1
@subreption
Subreption LLC
1 year
The test assembly rig from our blog post ( https://t.co/9ZCEWOcJT1) is now available at: https://t.co/Yk0kk5SBpF With @thingiverse gone downhill for years & their strange censorship policies, we are happy to support @josefprusa and his @Prusa3D @printablescom from Poland! #openipc
0
0
0
@subreption
Subreption LLC
1 year
It's never too late for a post about #chatgpt, finally. How well does it work for cryptography-related questions and challenges? Here's a short experiment just about that: https://t.co/AyB4B5PWdg #chatgpt #HackTheBox (TL;DR Not terrible)
0
0
0
@subreption
Subreption LLC
1 year
While everyone was busy having a #crowdstroke, we have published a short primer about hardware and firmware reverse engineering of a video sensor used in IPC devices and FPV drones, fresh out of the labs: https://t.co/9ZCEWOcJT1 #re #ghidra
Tweet media one
0
2
6
@subreption
Subreption LLC
2 years
A short blog post: IEEE 802.11 wireless spectrum coverage metrics (improving probability of intercept with traditional wireless adapters, with actual numbers per configuration and optimized channel hopping)
0
0
1
@subreption
Subreption LLC
2 years
On a different note, amidst the widespread plagiarism of original research in proactive defenses in Linux & other projects for the last decade, OpenBSD employs Machiavellian tactics: https://t.co/IpbdNinCEO "Release broken code, let them Ctrl+C/Ctrl+V, write sploits, ???"
0
0
0
@subreption
Subreption LLC
2 years
IR: While the case is being investigated, and based off the data available at Censys and other sources, we kindly ask any user of VPN services coming across this page to contact us, should you encounter emailAddress=kamil.inal@comodo.com or O=ComodoAnkaraGumus in SSL warnings.
0
0
1
@subreption
Subreption LLC
2 years
In today's climate of CDNs and load-balancing services, it is tough to accurately detect fraudulent certificates but almost invariably they share characteristics: regional CA (cooperative with state actor or compromised), lack of CRT listing, duration under 12 months, no pinning.
0
0
0
@subreption
Subreption LLC
2 years
IR: We are investigating a possible ongoing MITM against/perpetrated by a major VPN provider, the fraudulent certificates served have OU=ComodoAnk O=ComodoAnkaraGumus (Ankara, Turkey). The targeted CNs have their legitimate certificates listed in CRTs from non-regional CAs.
1
0
2