WelcomeWelcome | FAQFAQ | DownloadsDownloads | WikiWiki

Author Topic: flaw affects arm-based chips  (Read 1176 times)

Offline gadget42

  • Hero Member
  • *****
  • Posts: 927
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html

Offline gadget42

  • Hero Member
  • *****
  • Posts: 927
Re: flaw affects arm-based chips
« Reply #1 on: June 13, 2022, 11:04:44 AM »
fell down a rabbithole and saw some pages which referenced arm

linkfest:
https://www.alchemistowl.org/pocorgtfo/
https://openwall.info/wiki/people/solar/pocorgtfo
https://nostarch.com/gtfo
https://www.oreilly.com/library/view/pocgtfo/9781492067528/
https://github.com/angea/pocorgtfo

arm referenced in this issue:
PoC||GTFO 0x21, February 2022, Notebook of Altera NIOS Disassembly, Routable IPIP Spoofing, PCAP-NG Polyglots, Weird Machinery, Code Golfing, and UHF-VHF Tuners

the three pages referenced this work:
https://github.com/Baldanos/cortex-m-antidebug

20220613-1031am-modified to remove attempts to attach simple pdf pages since the third page was over the size limit(someday we will learn how to modify pdfs...any suggestions on a good tutorial?)
« Last Edit: June 13, 2022, 11:31:18 AM by gadget42 »
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html