Ken Munro (@thekenmunroshow) 's Twitter Profile
Ken Munro

@thekenmunroshow

Car hacker, IoT destroyer, sock purveyor, EV bore

ID: 1968424076

linkhttp://www.pentestpartners.com calendar_today18-10-2013 08:04:15

6,6K Tweet

9,9K Followers

300 Following

Ken Munro (@thekenmunroshow) 's Twitter Profile Photo

I can’t believe that 𝗚𝗮𝗳𝗳𝗲𝗿𝘀 Ⓥ 💙💛 managed to get me to drink Malort a second time. There I was, thinking that he’s a lovely gent bringing me a glass of bubbly. Moments later, retching. Lesson learned: Never, ever drink anything that the Gaffers gives you 🤣

Sam Swift 🐀🌻 🦊 (@safesecs) 's Twitter Profile Photo

I keep all my event badges (soz Eliza-May Austin) however this is the best one I’ve had by an actual conga mile. Wednesday was so incredible. Great cause, best people on the planet. Big love 💕 Cyber House Party Pen Test Partners

I keep all my event badges (soz <a href="/Eliza_MayAustin/">Eliza-May Austin</a>) however this is the best one I’ve had by an actual conga mile.

Wednesday was so incredible. Great cause, best people on the planet. Big love 💕

<a href="/HouseCyber/">Cyber House Party</a> <a href="/PenTestPartners/">Pen Test Partners</a>
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 (@_ethicalchaos_) 's Twitter Profile Photo

I am excited to announce that I'll be sharing the stage with Dirk-jan at DEF CON. Our talk has been accepted where I will be pulling apart Windows Hello protectors and key store and Dirk-jan will be demonstrating awesome techniques abusing WHfB for lateral movement to Entra

Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

🚨 Blog Post Alert: Hardware Hacking! This blog goes over reversing firmware and stripped binaries. Exploring how Ghidra's BSim plugin is transforming the identification and annotation of functions from known libraries. 👉pentestpartners.com/security-blog/…

Ken Munro (@thekenmunroshow) 's Twitter Profile Photo

Otto the Autopilot is off to DEF CON to support Aerospace Village as always. Find him at the A320 flight sim, or at 6am at the DEFCON run outside the LVCC. See ya there!

Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

🚀Ready for DEF CON 32 in Las Vegas? Join us & partners Aerospace Village & MarSec! Dive into aviation & maritime cybersecurity with simulators & talks. For more info on what is going on look on our DEF CON 32 event page! pentestpartners.com/event/def-con-… #DEFCON32 #Cybersecurity

🚀Ready for DEF CON 32 in Las Vegas? Join us &amp; partners <a href="/SecureAerospace/">Aerospace Village</a> &amp; <a href="/MarSecVillage/">MarSec</a>! Dive into aviation &amp; maritime cybersecurity with simulators &amp; talks.

For more info on what is going on look on our DEF CON 32 event page! 
pentestpartners.com/event/def-con-…
#DEFCON32 #Cybersecurity
Cybergibbons 🚲🚲🚲 (@cybergibbons) 's Twitter Profile Photo

Morning Defcon humans! Today at 1200, I'm going to be speaking on the ICS Village stage about another year of maritime fuckery. Want to learn about why the MV Dali wasn't hacked? Want to learn how we can seriously impact operations on a vessel, just by changing our IP address?

Morning Defcon humans!

Today at 1200, I'm going to be speaking on the ICS Village stage about another year of maritime fuckery.

Want to learn about why the MV Dali wasn't hacked?

Want to learn how we can seriously impact operations on a vessel, just by changing our IP address?
Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

Our latest blog outlines how to root Android devices 🔐 You'll find: Detailed instructions on using Magisk for rooting. Insights into the benefits and risks associated with rooting. Practical precautions to conduct the root safely Read it here pentestpartners.com/security-blog/…

Our latest blog outlines how to root Android devices 🔐

You'll find:
Detailed instructions on using Magisk for rooting.
Insights into the benefits and risks associated with rooting.
Practical precautions to conduct the root safely

Read it here pentestpartners.com/security-blog/…
Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

Vulnerability disclosure🚨Two serious vulnerabilities have been discovered in the Proroute H685t-w 4G Router running firmware version 3.2.334: 1. Authenticated Command Injection (CVSS: 8.8 - High) Attackers can execute arbitrary commands via the admin interface. Affects the

Vulnerability disclosure🚨Two serious vulnerabilities have been discovered in the Proroute H685t-w 4G Router running firmware version 3.2.334:

1. Authenticated Command Injection (CVSS: 8.8 - High)
Attackers can execute arbitrary commands via the admin interface.
Affects the
Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

We're heading to London next week for a double feature at the International Cyber Expo and the International Security Expo.💡Discuss all things cybersecurity at the Cyber Expo with our team at Stand P42 and check out our cool props. Don't miss Ken Munro talk next door at

We're heading to London next week for a double feature at the International Cyber Expo and the International Security Expo.💡Discuss all things cybersecurity at the Cyber Expo with our team at Stand P42 and check out our cool props. Don't miss <a href="/TheKenMunroShow/">Ken Munro</a> talk next door at
Ken Munro (@thekenmunroshow) 's Twitter Profile Photo

Looking forward this! I’ll be speaking at 1630 about the reality of hacking planes, then might be found at the Cyber House Party - sadly Otto the Autopilot will not be in attendance, as he needs topping up!

Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

Mark, Cybergibbons 🚲🚲🚲 and Ken Munro are in Detroit at the Auto-ISAC Summit 2024, using off-the-shelf 3rd party tooling to unlock automotive ECUs, bypass security, and recover data such as keys, firmware, and other secrets. 🛠️💻 In this demo, we are unpicking and

Mark, <a href="/cybergibbons/">Cybergibbons 🚲🚲🚲</a> and <a href="/TheKenMunroShow/">Ken Munro</a> are in Detroit at the <a href="/AutoISAC/">Auto-ISAC</a> Summit 2024, using off-the-shelf 3rd party tooling to unlock automotive ECUs, bypass security, and recover data such as keys, firmware, and other secrets. 🛠️💻

In this demo, we are unpicking and
Raspberry Pi (@raspberry_pi) 's Twitter Profile Photo

Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In contrast, we aim to find and fix them. Read the results of our RP2350 Hacking Challenge: rpltd.co/rp2350-challen…

Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In contrast, we aim to find and fix them. 

Read the results of our RP2350 Hacking Challenge: rpltd.co/rp2350-challen…
Pen Test Partners (@pentestpartners) 's Twitter Profile Photo

Our Ken Munro recently presented at BCS, The Chartered Institute for IT, The Chartered Institute of IT, with an evening on hacking various transport systems, including planes, trains, automobiles, and ships…   He highlighted the advantages of connectivity in our transportation networks, such as the

Our <a href="/TheKenMunroShow/">Ken Munro</a> recently presented at <a href="/bcs/">BCS, The Chartered Institute for IT</a>, The Chartered Institute of IT, with an evening on hacking various transport systems, including planes, trains, automobiles, and ships…
 
He highlighted the advantages of connectivity in our transportation networks, such as the