丂卄ㄖᗪ卂几 - 👋 crack fingers Profile picture
Microsoft Threat Intelligence Centre, deaf, BSL https://t.co/ZaRUlLAHgk
Oct 2, 2024 7 tweets 2 min read
For over a year my free time has been spent turning this ‘LilyGo T-Dongle S3’ into hacking tool USB/WiFi/BT which I’ve named the USB Army Knife.

This device is cheap, tiny, has a screen, SPI port, button and can do a ton of stuff with the ESP32-S3 inside.

It has consumed me! 🧵 Lily go T dongle S3 First up look at that hidden micro SD card slot. With that kind of storage and the fact it’s so cheap it’s throwaway you can start planning attacks that live a long time.

The ESP32 inside has a full USB stick and can do your usual BadUSB/HID and run attacks. BUT… Image
Mar 31, 2024 4 tweets 1 min read
Some questions relating to how the xz backdoor was going to be operationalised.

1) Sending your backdoor SSH key to all machines you’re interested in hacking is bad opsec. What was the plan to determine in advance if a box was vulnerable? SSH version is a poor choice. 2) how are Linux commands going to be encoded in the key. These keys are going to turn up and you don’t want them looking malicious straight out the door.