InfPCTechStack's profile picture. Security Researcher, UEFI, Windows Kernel, TPM

(RT is mainly for me to read them later...)

MachineHunter

@InfPCTechStack

Security Researcher, UEFI, Windows Kernel, TPM (RT is mainly for me to read them later...)

고정된 트윗

Slides of my #BHUSA talk Shade BIOS has been uploaded! blackhat.com/us-25/briefing… Github link is below github.com/FFRI/ShadeBIOS… Thank very much for attending my presentation! I’m sorry I wasn’t able to talk to many of you, as I was feeling unwell throughout the #BlackHatEvents

InfPCTechStack's tweet image. Slides of my #BHUSA talk Shade BIOS has been uploaded!
blackhat.com/us-25/briefing… 

Github link is below github.com/FFRI/ShadeBIOS…

Thank very much for attending my presentation!
I’m sorry I wasn’t able to talk to many of you, as I was feeling unwell throughout the #BlackHatEvents

MachineHunter 님이 재게시함

Microsoft just open sourced a Rust implementation of UEFI boot firmware called "Patina" this is a MASSIVE step forward in improving boot security for all. Exciting!!! github.com/openDevicePart…


MachineHunter 님이 재게시함

FFRIセキュリティの純国産エンドポイント製品「yarai」は、今回アサヒグループHDを攻撃したロシア系ランサムウェア『Qilin』を検出済みでした😆 もしアサヒ🍺がyaraiを導入していたら、あの被害は防げていた可能性がありそう。。

usa___kabu's tweet image. FFRIセキュリティの純国産エンドポイント製品「yarai」は、今回アサヒグループHDを攻撃したロシア系ランサムウェア『Qilin』を検出済みでした😆
もしアサヒ🍺がyaraiを導入していたら、あの被害は防げていた可能性がありそう。。
usa___kabu's tweet image. FFRIセキュリティの純国産エンドポイント製品「yarai」は、今回アサヒグループHDを攻撃したロシア系ランサムウェア『Qilin』を検出済みでした😆
もしアサヒ🍺がyaraiを導入していたら、あの被害は防げていた可能性がありそう。。

MachineHunter 님이 재게시함

💾✨Imagine cracking open tiny #microSD card—not just to see whats inside, but to understand it With pin-out analysis, visual signal decoding & real exercises you’ll explore the paths data take with Michal Paczkowski at #hw_ioNL2025 👉hardwear.io/netherlands-20… #monolithicdevices

hardwear_io's tweet image. 💾✨Imagine cracking open tiny #microSD card—not just to see whats inside, but to understand it

With pin-out analysis, visual signal decoding & real exercises you’ll explore the paths data take with Michal Paczkowski at #hw_ioNL2025

👉hardwear.io/netherlands-20…

#monolithicdevices

MachineHunter 님이 재게시함

🔓List of public attacks on BitLocker github.com/Wack0/bitlocke… 🪛More info about BitPixie: neodyme.io/en/blog/bitloc… If you have an account the easiest way to decrypt is if with the recovery key found at: aka.ms/myrecoverykey (personal) portal.manage.microsoft.com (managed devices)


MachineHunter 님이 재게시함

TEEに対して物理攻撃は現実的では無いのでカバーしなくて良いとか甘えた事を言って、各ベンダがのらりくらりと躱していたら、遂に50ドルで実現してSGXやSEV-SNPを壊滅させる攻撃が出たのを、会社の人からの伝聞で知った batteringram.eu


MachineHunter 님이 재게시함

FFRI × NFLabs. Cybersecurity Challenge 2025は無事終了いたしました。ご参加いただいた皆様、ありがとうございました。公式Writeupと問題ファイルをこちらに公開しています。参加できなかった方もぜひチェックしてみてください。 github.com/FFRI/FFRI-NFLa… #FFRI #NFLabs #CybersecurityChallenge2025


MachineHunter 님이 재게시함

Had a blast attending and presenting at @labscon_io for the second year in a row! If you are curious about BYOVD in UEFI, and how we at @binarly_io uncovered an incomplete patch for a Supermicro BMC bug, check out our talk slides below👇

pagabuc's tweet image. Had a blast attending and presenting at @labscon_io for the second year in a row! If you are curious about BYOVD in UEFI, and how we at @binarly_io uncovered an incomplete patch for a Supermicro BMC bug, check out our talk slides below👇

Very excited for this CodeBlue talk, as the deeper insights into this bootkit will be explained with 40-min slides. Especially for Android bootkit but Windows rootkit also seems interesting as it uses many techniques that exisiting UEFI bootkits doesn't use (WOOT paper Table 1).

I'm happy to present at CODE BLUE 2025! It’ll cover the same topic as my USENIX WOOT talk(BOOTKITTY), but this time I’ll present deeper insights into the bootkit details I couldn’t share at WOOT. See you at CODE BLUE! codeblue.jp/en/program/tim…



他のBriefingsの発表紹介は下記の発表をまとめました - Machine Check 例外による ring 0 → ring -2 権限昇格 - BYOVB(ootloader)可能なセキュアブートバイパスの脆弱性 - BitUnlocker. Windows リカバリーの脆弱性を使って Bitlocker をバイパス

今回のエンジニアブログは Black Hat USA 2025 の登壇報告になります。 今年は中川と松尾の 2 名がそれぞれ Briefings へ登壇しましたが、まずは松尾の報告になります。 登壇経緯、当日の感想に加え、いくつかの発表をご紹介します。#ffri_research #uefi engineers.ffri.jp/entry/2025/09/…



MachineHunter 님이 재게시함

🚨Binarly REsearchers revisit an already-patched Supermicro BMC bug and discover two new high-impact vulnerabilities that expose major gaps in software supply chains. CVE-2025-7937: bypassed “fix” for CVE-2024-10237. CVE-2025-6198: Supermicro RoT bypass. binarly.io/blog/broken-tr…


Loading...

Something went wrong.


Something went wrong.