Michael Coppola Profile Banner
Michael Coppola Profile
Michael Coppola

@mncoppola

Followers
2,813
Following
477
Media
72
Statuses
1,091

Vulnerability researcher

Joined January 2012
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@mncoppola
Michael Coppola
3 months
New blog post "Google: Stop Burning Counterterrorism Operations" My reflection on an incident where Project Zero and TAG knowingly shut down an active Western counterterrorism cyber operation, and the real-world harm that could have resulted from it.
80
141
573
@mncoppola
Michael Coppola
8 years
Tech startups: if you're having trouble coming up with a joke for today, just post your business plan
2
88
85
@mncoppola
Michael Coppola
9 years
DIE for IDA does runtime function tracing, and defines all executed code and indirect xrefs #reconmtl
1
83
76
@mncoppola
Michael Coppola
8 years
"A master never blames his tools" ...someone has clearly never used gdb
3
26
72
@mncoppola
Michael Coppola
5 months
I lost a friend last week. Sophia was one of the most incredible people I’ve ever met in so many ways. I’m still trying to find the words, but her passing is nothing short of a tragedy. She touched so many lives and was a force in this industry. We miss you Sophia.
@Margin_Research
Margin Research
5 months
Statement on the passing of Sophia d’Antoine, CEO and founder of Margin Research @Calaquendi44
Tweet media one
0
120
343
4
4
66
@mncoppola
Michael Coppola
8 years
Recurring theme, Favorites tools of reverse engineering: IDA Pro, strings, binwalk, vendor mistakes, shady Chinese sites
3
22
61
@mncoppola
Michael Coppola
6 years
Time and time again I find relaxing with a notepad + pen, going to the gym, taking a walk, literally anything but sitting staring at a computer is one of my best work habits. 95% of my good ideas come during this time, and my stress is significantly reduced.
0
5
41
@mncoppola
Michael Coppola
11 months
Writing “Unfortunately, …” before the description of a bug or exploit technique is the most whitehat thing you can do
3
1
38
@mncoppola
Michael Coppola
2 years
My team at Trenchant (formerly Azimuth) is hiring! If you’re a baseband or cellular researcher and want to work alongside some of the most talented hackers in the industry, send me a DM.
0
10
34
@mncoppola
Michael Coppola
10 years
Decoded the image data on the Furby mask ROM with the help of friends. Now it's possible to craft arbitrary images. http://t.co/j7qVSGxZtr
Tweet media one
2
32
31
@mncoppola
Michael Coppola
12 years
New blog post: "Suterusu Rootkit: Inline Kernel Function Hooking on x86 and ARM" http://t.co/Fy32zxVI
0
33
27
@mncoppola
Michael Coppola
8 years
Mr. President, I'm Blake from the National Kiwi-Americans Association. Is it fair to describe your administration as heaps munted?
1
15
27
@mncoppola
Michael Coppola
2 years
Pulling this one from the vault… I’ll be presenting about my first ever project I worked on at Azimuth! I’m excited to share it, come check it out!
@HackingForSoju
HackingForSoju
2 years
🌠🦊*Starfox* A Case Study in Exploiting Impractical Bugs @mncoppola will walk through his first project at @TrenchantARC at the @MidnightSunCTF Conference. Turning terrible primitives into a crazy Rube Goldberg exploit with reliable #iOS persistence as a side-effect. 📲😎
Tweet media one
0
12
27
2
7
23
@mncoppola
Michael Coppola
7 years
NOP certifications day 2. @markmossberg hacking hard or hardly hacking? @Calaquendi44 #youkillityoueatit
Tweet media one
0
5
22
@mncoppola
Michael Coppola
9 years
itsZN from RPISEC solved StringIPC by attacking vDSO in kernel memory and hijacking a root process #CSAW15
0
12
23
@mncoppola
Michael Coppola
8 years
Ctrl+W to save in IDA Pro has to be the worst shortcut ever to develop muscle memory for
1
6
20
@mncoppola
Michael Coppola
6 months
@chompie1337 Unless you’re Google TAG 😜
1
0
21
@mncoppola
Michael Coppola
11 months
Once again had an awesome time at @hexacon_fr ! It’s quickly become one of my favorite conferences. Great people, great talks, great location, and the team at @Synacktiv did an amazing job organizing it
0
0
20
@mncoppola
Michael Coppola
8 months
I’d rely on an LLM like an intern: where its output can only be an added benefit, where mistakes will reduce its effectiveness but not fail its purpose, where it’s low-cost to validate its results, for automation of tedious tasks, and as an “intelligent” source of randomness.
1
3
21
@mncoppola
Michael Coppola
10 years
Tweet media one
4
18
20
@mncoppola
Michael Coppola
9 years
Hard at work hacking... @CTurtE Michael: i think i fixed the exploit CTurt: fuck homework CTurt: I'm going to turn the PS4 back on
2
3
18
@mncoppola
Michael Coppola
6 years
I’m worried about a generation of hackers growing up without any blackhat role models
0
5
19
@mncoppola
Michael Coppola
7 years
IDA tip of the day - Binary search allows wildcard bytes with ??, like: AA BB ?? CC
1
7
18
@mncoppola
Michael Coppola
8 years
Demystifying the iPhone Secure Enclave by @msolnik @planetbeing and @kernelpool , one hell of a talk! #BHUSA
Tweet media one
0
3
17
@mncoppola
Michael Coppola
10 years
"The Art of Memory Forensics" demonstrates how to detect Suterusu in a Linux memory dump. :) http://t.co/iGuOCbTiC3
1
20
14
@mncoppola
Michael Coppola
8 years
Oh man look what I found @aaronportnoy
Tweet media one
2
0
16
@mncoppola
Michael Coppola
2 years
I'm officially enrolled at @NDU_CIC and taking my first course in the spring!
1
0
16
@mncoppola
Michael Coppola
11 years
New blog post: Reverse Engineering a Furby http://t.co/ItFe44WAUH
0
34
16
@mncoppola
Michael Coppola
1 month
@udunadan In many cases with modern VR you can’t just spend time and expect success. You need some sort of edge- a novel idea of how things can be broken, a deeper understanding of a subsystem, an unknown attack surface, or a unique exploit technique.
3
0
15
@mncoppola
Michael Coppola
8 years
I'm okay with branded vulnerabilities if they're all published like this (turn up the volume)
1
13
14
@mncoppola
Michael Coppola
9 years
20 year old C code, awesome! Someone should definitely merge it in!
1
21
14
@mncoppola
Michael Coppola
10 years
Great concise silicon reversing article even for software folks http://t.co/6dvbnX12xi
1
8
14
@mncoppola
Michael Coppola
7 years
I'd like to announce I did something in git and didn't accidentally delete everything
1
1
14
@mncoppola
Michael Coppola
2 months
Really enjoyed reading this rebuttal. It touches on a topic I hope to write more about in the future, that offense and defense are both necessary and must exist in balance with one another.
@JusticeRage
Ivan Kwiatkowski
2 months
New blog post: "The Case for Burning Counterterrorism Operations" My thoughts on why defenders should always report exploits and operations, even when they originate from "friendly" entities. This follows the recent debate in the community.
4
60
222
0
2
13
@mncoppola
Michael Coppola
8 months
I’m an LLM skeptic (for vuln research), but I enjoyed this discussion. I do not want one for bug detection, but there are some applications they’re well-suited for, either as a human aid or operating as certain components of certain tools.
@mboehme_
Marcel Böhme👨‍🔬
8 months
Quick show of hands: Who had positive experiences with LLMs for vulnerability discovery in practice? What's your story?
7
2
39
2
1
13
@mncoppola
Michael Coppola
6 years
Fun accidental trick: Pressing 'Enter' spaces out and formats lines in Hex-Rays output. Now how to delete them...
Tweet media one
6
0
13
@mncoppola
Michael Coppola
1 month
@mdowd @udunadan In the hands of a skilled researcher, that’s absolutely true and spending a lot of time is usually necessary as a first step. But I think how you spend that time is a crucial factor, and your ability to later turn that mental model into unique ideas. A junior might burn a year on
0
0
12
@mncoppola
Michael Coppola
5 months
Tweet media one
0
1
12
@mncoppola
Michael Coppola
4 months
On my way to @offensive_con ! See everyone there
0
1
12
@mncoppola
Michael Coppola
8 years
This is a fantastic resource for C++ vuln researchers. I learned a thing or two!
0
2
12
@mncoppola
Michael Coppola
11 years
New blog post: Writeup for my @CSAW_NYUPoly CTF Linux kernel exploitation challenge "Brad Oberberg" http://t.co/PJH6IlTOag
0
13
11
@mncoppola
Michael Coppola
2 years
I'm working through the @newaetech ChipWhisperer labs this weekend, and as a (primarily) software person it's just plain exciting performing hardware attacks like this.
1
1
11
@mncoppola
Michael Coppola
9 years
Anyone have a lead on where to acquire a PS4, max firmware version 1.76? Nearby Boston preferred
7
2
9
@mncoppola
Michael Coppola
10 years
Looks like the Blackhat EU '14 slides are up before the con. Anyone have a link to the videos?
1
12
11
@mncoppola
Michael Coppola
11 years
Source code from my CSAW CTF 2013 Linux kernel exploitation challenge. Blog post soon!
0
9
10
@mncoppola
Michael Coppola
2 months
@harlanhaskins Do you think I have this information
2
1
10
@mncoppola
Michael Coppola
9 years
PEDA makes GDB actually usable. Cool seeing familiar faces on the project @ebeip90 @jeffreycrowell @JonathanSalwan
1
0
9
@mncoppola
Michael Coppola
7 years
Happy 10 years in security to me! Although my love for computers has since turned to hate, my love for hacking them remains unwavering ❤️
0
0
8
@mncoppola
Michael Coppola
11 years
Having some fun with a DSLR. Still super hacky, but imaging capabilities are getting better. Also, flashlight app. http://t.co/LJ1FLsCJsn
Tweet media one
1
9
8
@mncoppola
Michael Coppola
9 years
It's a shame it's a cool bug, there's opportunity for a snake oil joke in there somewhere #VENOM
0
6
7
@mncoppola
Michael Coppola
2 years
@WangTielei Arbitrary read/write primitive
0
0
8
@mncoppola
Michael Coppola
10 years
Awesome article: Classic NES Series Anti-Emulation Measures
0
7
8
@mncoppola
Michael Coppola
10 years
TIL gcc allows ellipses to specify range in switch case statements http://t.co/oouverk99q
1
8
8
@mncoppola
Michael Coppola
10 years
Tweet media one
4
0
7
@mncoppola
Michael Coppola
11 months
I'll be attending @CYBERWARCON for the first time this year. Feel free to say hi!
0
1
8
@mncoppola
Michael Coppola
2 years
Lab 2_1B uses power analysis to leak a password from a target MCU. By collecting power traces of login attempts, I could identify the single unique traces and programmatically brute force the password character-by-character.
Tweet media one
Tweet media two
Tweet media three
1
2
8
@mncoppola
Michael Coppola
9 years
Total @digitalocean bill for running the Linux kernel CTF challenge for 3 days: $9.01. Includes 17 VMs and various test machines
0
0
7
@mncoppola
Michael Coppola
9 years
It's that time of the year again to watch nerds cry and @HockeyInJune play his weird CTF videos at @CSAW_NYUPoly
0
1
7
@mncoppola
Michael Coppola
5 years
I’m continually impressed with the research published by the console hacking community. Great work!
@theflow0
Andy Nguyen
5 years
I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities!
Tweet media one
59
339
1K
0
0
7
@mncoppola
Michael Coppola
3 months
@udunadan I’ve always thought that talks should spend more time on the journey, not just the results. I want to learn about the failed ideas as much as the successful ones- the wrong turns and near misses. And the incremental building up of understanding about a target.
2
0
7
@mncoppola
Michael Coppola
10 years
Every now and then I'll think "hmm.. Hacker News is pretty smart." Then not long after realize "...nope, never mind."
1
0
7
@mncoppola
Michael Coppola
9 years
TIL Hex-Rays allows variable names consisting entirely of parentheses http://t.co/j7TCRrWKff
Tweet media one
1
1
7
@mncoppola
Michael Coppola
8 months
@mboehme_ I’m not on the LLM hype train. But I think it might have interesting applications in mutation or testcase generation in fuzzing. I’d otherwise rather invest in better static analysis tools.
2
0
7
@mncoppola
Michael Coppola
9 years
I was looking through my high school yearbook and found this amazing quote of mine from 5 years ago. http://t.co/A1z0Sl7kbE
Tweet media one
2
2
7
@mncoppola
Michael Coppola
12 years
Releasing Suterusu, a new Linux/Android rootkit. Does all the basics and then some, supports new 3.x kernels. http://t.co/fN1J7XjX
1
13
7
@mncoppola
Michael Coppola
8 months
One of the most important FOIAs to ever be filed
@dakotathekat
(da)kota/the/Kæt
8 months
I have acquired the fabled NSA "FURBIE ALERT" memo. I have a significant amount of documentation that came back on an FOIA and I'll be scanning it in the coming days. Stay tuned.
Tweet media one
17
425
2K
0
0
7
@mncoppola
Michael Coppola
7 years
If you're interested in the ethics of drone warfare, I highly recommend the movie "Eye in the Sky." It does an impressive job showcasing the moral, legal, and operational calculus surrounding collateral damage in a neutral manner. (Also, Aaron Paul)
0
0
6
@mncoppola
Michael Coppola
1 year
@Laughing_Mantis Everyone on the sub7 train but I was more a Beast fan
Tweet media one
1
0
6
@mncoppola
Michael Coppola
10 years
0
6
6
@mncoppola
Michael Coppola
9 years
I was able to find a PS4 with appropriate firmware version. Thanks everyone!
0
0
6
@mncoppola
Michael Coppola
8 years
The security aspect of cyber is very, very tough.
0
1
6
@mncoppola
Michael Coppola
8 years
In my professional cyber experience there is no problem you can't debug with printf and sleep. Who even needs a debugger.
3
0
6
@mncoppola
Michael Coppola
3 months
@udunadan The thought process and approach that led to success is one of the more valuable things a researcher can convey, rather than just a list of dead bugs.
0
0
6
@mncoppola
Michael Coppola
11 years
Arbitrary code execution in Pokemon Red/Blue using the "8F" item http://t.co/uYX7q77DMS
0
6
5
@mncoppola
Michael Coppola
10 years
I have no idea why math pairs 'm' with 'n' and 'v' with 'u'. I sure as hell can't differentiate them when my professor writes on the board.
1
3
5
@mncoppola
Michael Coppola
11 years
Let's try this crowdsourcing thing. What features do you want to see in Suterusu rootkit next?
1
3
5
@mncoppola
Michael Coppola
2 years
Excited to be at @hexacon_fr this week!
0
0
5
@mncoppola
Michael Coppola
10 years
Just reimplemented an 82-line function by accident. Diffed the two and apparently I wrote it exactly the same. At least I'm consistent.
1
0
5
@mncoppola
Michael Coppola
2 months
@guyru_ @0x41con A few thoughts: 1. If the seller thinks that exploitation is viable, why would they sell it as a primitive for a (much) smaller amount? 2. Lag time between primitive offer and exploit delivery introduces risk when buyer's needs and market availability can shift rapidly. Unless a
1
0
5
@mncoppola
Michael Coppola
10 years
After two years of IDA on a laptop, I finally learned the wonders of an external monitor. http://t.co/5hikPKqLzv
Tweet media one
1
0
5
@mncoppola
Michael Coppola
10 years
One of my professors started disallowing electronics in class. Unrelated, I've gotten pretty good at writing shellcode with pen & paper
1
4
5
@mncoppola
Michael Coppola
6 years
I’m reading Countdown to Zero Day and it’s full of cool facts about Stuxnet like
Tweet media one
2
1
5
@mncoppola
Michael Coppola
10 years
Looking forward to the class action lawsuit against @wemagin when backers realize it's utter bullshit
2
7
5
@mncoppola
Michael Coppola
9 years
@admob I'm at @HackBeanpot this weekend working on an AWESOME project. All that's missing is an AdMob library for native C. Any help?
1
5
5
@mncoppola
Michael Coppola
10 months
@HollaWaldfee100 1/ With new codebases I start by scanning for dumb traditional bugs (e.g. overflows, basic logic bugs). I know where user input starts but I don’t know how the code works yet and I’m making lots of assumptions along the way.
1
0
5
@mncoppola
Michael Coppola
9 years
@eliast @Drift I'm hanging out at the Hubspot office right now, come here :^)
2
0
5
@mncoppola
Michael Coppola
5 years
Finished reading ‘Battle of Wits’ - it’s a phenomenal, unexpectedly hilarious, book about British and US codebreakers in WWII. There are tons of parallels between 1940s cryptanalysts and hackers today, decades before anything even resembling a modern computer
1
0
5
@mncoppola
Michael Coppola
10 years
I've uploaded my @CSAW_NYUPoly 2014 Finals challenge "Suckerusu" with solution:
1
4
5
@mncoppola
Michael Coppola
5 years
Finally learned z3 this weekend to solve a puzzle at MIT #MysteryHunt . It’s a seriously cool tool (and way easier than expected) and I regret not learning it sooner
0
1
5
@mncoppola
Michael Coppola
8 years
Protip: if your IDA Pro analysis is crawlllllllllllllllllllllllllllling, close the Functions window
1
0
5
@mncoppola
Michael Coppola
9 years
Wireless HDMI is apparently a thing and works way better than I'd ever expect it to.
3
0
5
@mncoppola
Michael Coppola
10 years
Blackhat was the most expensive nap I've ever taken
0
0
5
@mncoppola
Michael Coppola
8 years
@djrbliss "Use SQL to corrupt the database!"
1
0
4