<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Julien Oberson &#8211; SCRT Team Blog</title>
	<atom:link href="/author/julien/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Orange Cyberdefense Switzerland&#039;s technical blog</description>
	<lastBuildDate>Tue, 29 Oct 2024 16:19:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>/wp-content/uploads/2024/10/cropped-favicon-32x32-1-32x32.png</url>
	<title>Julien Oberson &#8211; SCRT Team Blog</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Privilege escalation through TPM Sniffing when BitLocker PIN is enabled</title>
		<link>/2024/10/28/privilege-escalation-through-tpm-sniffing-when-bitlocker-pin-is-enabled/</link>
		
		<dc:creator><![CDATA[Julien Oberson]]></dc:creator>
		<pubDate>Mon, 28 Oct 2024 08:45:51 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">/?p=6045</guid>

					<description><![CDATA[This blog post offers additional insights following the presentation delivered at the Swiss Cyber Storm conference in Bern on October 22, 2024. Introduction TPM sniffing attacks are well documented and have been used for at least the last five years. In a nutshell, these attacks take advantage of two weaknesses related to the way discrete &#8230; <a href="/2024/10/28/privilege-escalation-through-tpm-sniffing-when-bitlocker-pin-is-enabled/" class="more-link">Continue reading <span class="screen-reader-text">Privilege escalation through TPM Sniffing when BitLocker PIN is enabled</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>TPM sniffing</title>
		<link>/2021/11/15/tpm-sniffing/</link>
		
		<dc:creator><![CDATA[Julien Oberson]]></dc:creator>
		<pubDate>Mon, 15 Nov 2021 13:37:00 +0000</pubDate>
				<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Hardware]]></category>
		<guid isPermaLink="false">/?p=2723</guid>

					<description><![CDATA[TL;DR: we reproduced Denis Andzakovic&#8217;s proof-of-concept showing that it is possible to read and write data from a BitLocker-protected device (for instance, a stolen laptop) by sniffing the TPM key from the LCP bus. Authors: Thomas Dewaele &#38; Julien Oberson Special thanks to Denis Andzakovic for his proof-of-concept and Joe Grand (@joegrand) for his hardware hacking &#8230; <a href="/2021/11/15/tpm-sniffing/" class="more-link">Continue reading <span class="screen-reader-text">TPM sniffing</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>recon Bruxelles 2017</title>
		<link>/2017/02/16/recon-bruxelles-2017/</link>
		
		<dc:creator><![CDATA[Julien Oberson]]></dc:creator>
		<pubDate>Thu, 16 Feb 2017 14:47:05 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<guid isPermaLink="false">/?p=2164</guid>

					<description><![CDATA[Première édition de recon en Belgique en ce début d&#8217;année! Le logo de l&#8217;évènement change, mais le programme reste le même: Reverse engineering et exploitation. Du coup, pas une seule conférence n&#8217;a oublié son screenshot d&#8217;IDA Pro (qui est d&#8217;ailleurs le sponsor de l&#8217;évenement). Comme pour l&#8217;édition 2016 de Montréal, les conférences ont duré trois &#8230; <a href="/2017/02/16/recon-bruxelles-2017/" class="more-link">Continue reading <span class="screen-reader-text">recon Bruxelles 2017</span></a>]]></description>
		
		
		
			</item>
	</channel>
</rss>
