Markus Vervier ๐Ÿ‘พ

Security Chief Rocka @ X41

Markus Vervier ๐Ÿ‘พmarver
2025-06-10

@raptor gold!

Markus Vervier ๐Ÿ‘พ boosted:
2025-06-10

Surprise #MFA

SURPRISE MFA
Markus Vervier ๐Ÿ‘พmarver
2025-03-21

"Your malware is fake!" That's correct. Here's a small tool to generate payloads out of YARA rules: github.com/persistent-security

We use it as part of a testsuite for detection & monitoring.

Markus Vervier ๐Ÿ‘พ boosted:
2025-03-10

X41 performed an audit of Hickory DNS which is an open source Rust based DNS client, server, and resolver. We were sponsored by the great folks at @ostifofficial and supported by @ProssimoISRG

Our full report can be downloaded here: x41-dsec.de/security/research/

Markus Vervier ๐Ÿ‘พmarver
2024-11-25

@jomo @LaF0rge @jiska Never did, but first things I would try:
- AT+CSIM
- PRO_CMD_PERFORM_CARD_APDU on a custom applet deployed via a custom eSIM profile to the eUICC
- SMS-PP on a custom profile

Markus Vervier ๐Ÿ‘พmarver
2024-09-21

Join me in October at hardwear.io for a training about eSIM! Register at hardwear.io/netherlands-2024/t

Join me in October at @hardwear_io for a training about eSIM! Register at https://hardwear.io/netherlands-2024/training/eSIM-eUICC-security-for-securitys-experts.php #esim #euicc
Markus Vervier ๐Ÿ‘พmarver
2024-05-21

@G33KatWork @x41sec Unfortunately the collab with @q3k never happened......yet! ;-)

Markus Vervier ๐Ÿ‘พ boosted:
2024-05-21

We just published our research on the use of power side channel analysis for fuzzing:
x41-dsec.de/news/2024/05/21/ch

Markus Vervier ๐Ÿ‘พmarver
2024-05-08
Markus Vervier ๐Ÿ‘พmarver
2024-05-06

@briankrebs You realize this is known in various instances (DNS, DHCP, static routes, auto network discovery) since nearly two decades? There was a BH talk last year (tunnelcrack.mathyvanhoef.com/d), people tweeted about it (twitter.com/0xjomo/status/9290), conference submissions (me in 2011). Even the old Cisco VPN client (!) used to have a built-in mitigation for this.
The memory loss in infosec is one of our biggest problems today!

Markus Vervier ๐Ÿ‘พ boosted:
2024-04-10

Chilkat PRNG Vulnerability Impact on E2EE Messenger ginlo x41-dsec.de/news/2024/04/09/gi

Markus Vervier ๐Ÿ‘พ boosted:
2024-04-10
Markus Vervier ๐Ÿ‘พmarver
2024-03-04

There's also libc implementations written in Rust, a quite elaborate trolling. ;-)

mastodon.social/@sovtechfund/1

Markus Vervier ๐Ÿ‘พ boosted:
2024-03-03

Here's the project you all were wondering why it doesn't exist yet: digipres.club/@foone/111948980, ioc.exchange/@azonenberg/11084

Introducing USBKVM! A keyboard, screen and mouse that all fit in your the palm of your hand!

It's built around the MS2109 HDMI to USB capture chip and its IยฒC interface connected to an STM32 MCU that takes care of the keyboard and mouse emulation.

While the hardware is fully functional, firmware and software are in a proof-of-concept stage. Stay tunedโ€ฆ

A 4ร—4cm green circuit board. On the left edge, there's a USB-C and a HDMI connector. On the right edge is another USB-C connector.

The main components on the board are
 - STM32F042 connected to the left USB connector
 - MS2109 (with the marking lasered off)The raspberry pi desktop in a window titled "USBKVM". In the lsusb output in the terminal, there's a TinyUSB device.ThinkPad UEFI setup startup page in the USBKVM window.
Markus Vervier ๐Ÿ‘พmarver
2024-02-28

German police caught Daniela Klette from the RAF after 30 years on the run. Turns out she was living in the middle of Berlin, got a Facebook account and if you put her image into even one of the public biometric search engines, you can find her without much effort.

Markus Vervier ๐Ÿ‘พ boosted:
2024-02-21

Ever wondered how to binary diff router firmwares to write n-day exploits?
Learn how @thezero and @suidpit combined unblob, binexport, ghidra, Qiling, and an Asus router to write an exploit for CVE-2023-39228.
The outcome was unexpected ...

While attending @silviocesare training at @cybersaiyan's RomHack @thezero and @suidpit chose to do some practice. While looking at the news they discovered about some recently disclosed ASUS routers unauthenticated RCEs.

They quickly bin-diffed the firmware versions, found the vulnerabilities, emulated the vulnerable firmware, and wrote and exploit for one of them.
This was so fast they had a working exploit even before jumping off the wayback ๐Ÿš‚.

Once at home they used their research budget to buy a real device and prove the vulnerability there too, but ... it was not working ๐Ÿคฏ
Know what? The vulnerability was not unauthenticated on the physical device!

After some intense debugging sessions they discovered that not only that one but also a lot of other ASUS routers' vulnerabilities were probably incorrectly deemed as unauthenticated.

Apparently most of the researchers are either keeping an authentication bypass private or they do their research in emulated environments only and no one ever checked the vulnerabilities before issuing the CVE numbers and releasing the advisories.

TL;DR
Product security folks: do not blindly trust the attack requirements shared by the researchers.
Security researchers: when testing embedded devices make sure to mimic correctly all their configurations (i.e. the NVRAM content).

shielder.com/blog/2024/01/hunt

Markus Vervier ๐Ÿ‘พ boosted:
2024-02-14

We've posted two new blogs today about #security in #BIND. Check them out!

One specifically relates to the vulnerabilities disclosed yesterday: isc.org/blogs/2024-bind-securi

The other reports on our recent BIND 9 security audit: isc.org/blogs/2024-bind-audit/

Markus Vervier ๐Ÿ‘พ boosted:
2024-02-14

We just released the results of our audit of BIND9, sponsored by ISC. Another interesting audit with @marver. Thanks to @ondrej for the support.
x41-dsec.de/news/security/rese

Markus Vervier ๐Ÿ‘พ boosted:
2024-02-14

X41 reviewed the source code of BIND9 for security issues on behalf of the @iscdotorg . More details and the full report are available here:
x41-dsec.de/news/security/rese

Markus Vervier ๐Ÿ‘พ boosted:
2024-02-09

@marver and @mumblegrepper will provide a training NULLCON Berlin 2024. Register now: nullcon.net/berlin-2024/traini

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst