stacksmashing

stacksmashing

Hi, I'm a security researcher who creates videos on reverse-engineering, hardware security, and everything else I find interesting!

DOOM on the Game and Watch

DOOM on the Game and Watch

Exploring the Mew Glitch

Exploring the Mew Glitch

Пікірлер

  • @kitsune-chan6897
    @kitsune-chan689723 сағат бұрын

    Now play DOOM on it.

  • @alrikrr
    @alrikrrКүн бұрын

    Thanks for this amazing video ! I ordered some PCB and started soldering the PICO, thou the pogo pins are a pain to solder, any tips ?

  • @halvarmc671
    @halvarmc6714 күн бұрын

    The best practice is to always 0 your drive before recycling or 0 and reinstall the OS if you're selling the laptop. In the case of externals, I always 0 or reformat.

  • @Turco949
    @Turco9494 күн бұрын

    A single pass zero-write is hardly that guaranteed that the data can never be recovered. Best is to wipe/zero write the drive then physically destroy it. At the very least, a 3-pass DOD level wipe or something equivalent is needed.

  • @Mani-kt5iw
    @Mani-kt5iw5 күн бұрын

    Would it also work if us a esp32 instead of the Raspberri pi pico

  • @cat-win98
    @cat-win985 күн бұрын

    STOP CENSORING THE SCREEN!!!!!!! 🤬🤬🤬🤬🤬😡😡😡😡

  • @cat-win98
    @cat-win985 күн бұрын

    WHY DO YOU CENSOR THE SCREEN???????? 😡😡🤬🤬🤬🤬🤬

  • @stacksmashing
    @stacksmashing5 күн бұрын

    Because Nintendo sent a take down.

  • @Rayan-Singh
    @Rayan-Singh7 күн бұрын

    So this won't work on newer CPU's that use TPM which is inbuilt on the CPU like Newer Gen Ryzen and Intel ?

  • @literallydoing4425
    @literallydoing442510 күн бұрын

    well, linux *is* in fact better IG

  • @pcguy5491-the-modern-retro-man
    @pcguy5491-the-modern-retro-man11 күн бұрын

    Next video should be why 222222222222222 is a valid quake 3 arena cd key

  • @pcguy5491-the-modern-retro-man
    @pcguy5491-the-modern-retro-man11 күн бұрын

    Monster truck madness, office 95/97, microsoft hellbender and any microsoft product before 1998 except plus 98 also works with this same key too.

  • @walsterdoomit
    @walsterdoomit12 күн бұрын

    Above my pay grade but pretty cool video.

  • @Vadermods
    @Vadermods13 күн бұрын

    now as a cherry on top, make a multiplayer game besides Tetris, something open world would be groundbreaking if you built it it on top of the wifi cart we have avalible to us now.

  • @marcoc.6022
    @marcoc.602213 күн бұрын

    Is it also possible to remove the linked apple id?

  • @YogurtGood
    @YogurtGood14 күн бұрын

    cool

  • @IIIIIIIIIIIllllllIIIIIIIIIII
    @IIIIIIIIIIIllllllIIIIIIIIIII16 күн бұрын

    Awesome

  • @lashlarue7924
    @lashlarue792416 күн бұрын

    I am a lowly sweet potato 🍠 and do not comprehend such things. Serve me piping hot with a pinch of cinnamon and a dollop of bytecode.

  • @TheTarkovSh00ter
    @TheTarkovSh00ter17 күн бұрын

    Add a pin, dont store stuff that you need on main drive. This only gets you into windows it doesnt decrypt other drives.

  • @joelstolarski2244
    @joelstolarski224417 күн бұрын

    Amazing and so well explained. Have a dell micro 3080 that belonged to a company, recovered from an unpaid storage unit. Have bought several laptops the same way. This is first one, that had a bitlocker encrypted drive. I'm new to using kali, and have done an 8266 nodmcu deauth chip, but this is a little more involved. Don't have a raspberry pi yet. Thanks for the tutorial !

  • @DeweckPewez
    @DeweckPewez17 күн бұрын

    PS2 Slim

  • @DeweckPewez
    @DeweckPewez17 күн бұрын

    GAME BOY COLOR ONLINE MULTIPLAYER

  • @michaelknight4041
    @michaelknight404117 күн бұрын

    I don't know about this guy. The Indian dude hacking and splicing a standard USB to a Lightning cable with a resistor and a capacitor in between while horrible Indian music looped over and over seemed more trustworthy. Im gonna go see what hes up to.

  • @nataliegrn17
    @nataliegrn1717 күн бұрын

    Thanks!

  • @Smiley_Frown
    @Smiley_Frown20 күн бұрын

    Who are you

  • @silvereagleranch7352
    @silvereagleranch735221 күн бұрын

    what hardware do u need to buy... for my machine?

  • @CoachMikeyStudios
    @CoachMikeyStudios23 күн бұрын

    I used to encrypt hard drives all the time in the windows XP days. It would take days. I always wanted to know why bitlocker works so quickly. Great video. Thanks for sharing.

  • @mbican
    @mbican23 күн бұрын

    Well, of course TPM without PIN is useless, you just turn on the laptop and it is decrypted, you can also do cold boot attack and read memory, there is many ways how to bypass TPM without PIN, it's a lock without a key 🤷‍♂️

  • @Muhammad-re4wk
    @Muhammad-re4wk24 күн бұрын

    The way he says Ghidra drives me crazy

  • @stacksmashing
    @stacksmashing23 күн бұрын

    yep, completely wrong 😀 sorry about that

  • @damny0utoobe
    @damny0utoobe24 күн бұрын

    Excellent tutorial

  • @NeverSuspects
    @NeverSuspects24 күн бұрын

    Anyone who would care to steal encrypted data would come prepared or have taken the whole laptop to gain access to it with no time limit.. Anyone who really really want to get access will find information like this video and read a bit and carry out the process.. so what dies this whole thing really provide to the user outside of possibly difficult recovery process?? Microsoft gets a new word to use in marketing the os "Secured with BitLocker!"

  • @jackkirby5287
    @jackkirby528725 күн бұрын

    How do I identify which chip is the TPM? And how do I identify the LPC bus? I've been looking over an HP for hours and I cannot seem to find either one.

  • @nnibxx
    @nnibxx25 күн бұрын

    Awesome, do you know how is wired (color coded) in the terminal?

  • @aurelienlevra3782
    @aurelienlevra378225 күн бұрын

    Most pedagogic content about a presentation of how the ELF format work. Top tier quality content

  • @RapidWildFire
    @RapidWildFire25 күн бұрын

    Companies should still throw the harddrive when they sell laptops separately. This is for the sole purpose of stopping african criminals from recovering loose hard drives found in garbage dumps and selling their data. This whole bitlocker thing is for promoting shipping deceased hardware to 3rd wirld countries garbage dumps. Which is a very bad act in my opinion

  • @censoredeveryday3320
    @censoredeveryday332026 күн бұрын

    Or voltage and current glitching. An art that few have experience with.

  • @KuldeepYadav-jw7jn
    @KuldeepYadav-jw7jn26 күн бұрын

    Is there any in depth article or anything which explains the position independent execution in depth?

  • @-MohammedElSyed-
    @-MohammedElSyed-26 күн бұрын

    Why can't I store my keys on the MY FCKIN' USB DRIVE or just use password? Why am I forced to store my keys on that proprietary device which can't be dismounted from the machine?????? This industry is full of idiots.

  • @TheyCallMeApplePie
    @TheyCallMeApplePie26 күн бұрын

    Came her to kill some time. Dont understand a damn thing, but i like the video

  • @trickyd499
    @trickyd49926 күн бұрын

    i have bitlocked a drive, to mount it i have to enter the key manually. i presume im safe in that case

  • @elalemanpaisa
    @elalemanpaisa27 күн бұрын

    There are even easier attacks on luks because tpm happily tells you the keys

  • @XenXenOfficial
    @XenXenOfficial27 күн бұрын

    Just letting you know guys, I took the liberty to go out of my way and buy the parts, the board, etc etc. it's "less than 10 dollars of parts" cause the boards are $8-$9 dollars each, 4 boards minimum order, 8.99 for the prongs (comes in 100 pieces, so 8.99/100) and the pico which you can probably find for dirt cheap but I just bought a 2 pack for 17 dollars BUT. Still, considering how bitlocker is, how easily it gets triggered, and how many Lenovo PCs that I as a computer engineer work with this tool is extremely valuable lol

  • @XenXenOfficial
    @XenXenOfficial27 күн бұрын

    I would love a good suggestion to make it universal for whatever LPC bitlocker locked motherboard I find though, my first thought that came to mind is just soldering on some wires to the board and using them as contact points in case the connector isn't the right pinout or a different shape 🤔

  • @stacksmashing
    @stacksmashing27 күн бұрын

    Yeah we’ve been thinking about a couple of ideas for a more universal board - there’s also a PR for SPI support

  • @XenXenOfficial
    @XenXenOfficial27 күн бұрын

    @@stacksmashing PLEASE, I would LOVE SPI support. I'll pay lmao

  • @XenXenOfficial
    @XenXenOfficial27 күн бұрын

    @@stacksmashing if theres some modifications I could do to the board I got coming in or the code please let me know! Edit: I've done PCB work, made my own traces, etc. so really any modifications would be possible lol

  • @Scatman119
    @Scatman11927 күн бұрын

    Gutes Video, aber du musst unbedingt mal an deiner Aussprache üben. Ist echt anstrengend anzuhören.

  • @markmurphy3578
    @markmurphy357828 күн бұрын

    Interesting to see how relatively simple these are to exploit once the hardware has been investigated. I guess that removable storage would be a completely different matter. Time for me to subscribe

  • @Tecnoesclavos
    @Tecnoesclavos28 күн бұрын

    First Step. Error. Invalid Function Signature Can't parse name: argv[] Do you want to continue editing or abort your changes?

  • @stacksmashing
    @stacksmashing28 күн бұрын

    Set it to char ** argv instead of char * argv[] That’s also how it’s in the video in the second step - I assume [] is now reserved

  • @Tecnoesclavos
    @Tecnoesclavos28 күн бұрын

    @@stacksmashing yep it works, thank you!

  • @stacksmashing
    @stacksmashing28 күн бұрын

    No worries :) hope they eventually support that syntax

  • @Dan-qc7kq
    @Dan-qc7kq29 күн бұрын

    This TPM vulnerability is not new, it has been known for a number of years, but stacksmashing has created an excellent demonstration that shows how quickly an automated attack can intercept the encryption key and use it to decrypt the drive of a vulnerable system. Keep in mind that this attack only works against computers that have an external TPM mounted on the motherboard, which is no longer a common practice. Nowadays most PCs and laptops have TPM functionality built into their CPU, which makes the encryption key MUCH harder to intercept. It might still be possible, but so far I have not heard of any successful attempts. The other thing to remember is that this attack would have failed instantly if the user had merely set their BitLocker startup PIN or one of the other types of BitLocker preboot authentication. If you use BitLocker and you truly care about your security then you should definitely do this. To summarize, if you have a newer computer with a CPU-based TPM and/or if you have set the BitLocker startup PIN then you should be quite safe from this type of attack. That should be your main takeaway from this video.

  • @carrycat876
    @carrycat876Ай бұрын

    You are directly responsible for my microsoft stock going down last month. At the same time I appreciate your video very much

  • @videodude8137
    @videodude8137Ай бұрын

    Your are an excellent speaker, and gave an excellent tutorial. No silly background music. Very nice! Thank you.

  • @evolancer211
    @evolancer211Ай бұрын

    I want that! I would have so much fun at work with some of my coworkers bitlocker encrypted laptops 😂

  • @jackkirby5287
    @jackkirby5287Ай бұрын

    What kind of logic analyzer are you using?

  • @stacksmashing
    @stacksmashingАй бұрын

    Saleae

  • @Bike1337
    @Bike1337Ай бұрын

    Pra quem quiser e precisar remover a senha de fato sem formatar o disco veja essa técnica do vídeo abaixo. kzread.info/dash/bejne/qYiglth-lcfUm7Q.html

  • @nbaua3454
    @nbaua3454Ай бұрын

    Next laptops will come with resin glued circuits all over making this as difficult to repair as it is not today...