Tweets

You blocked @DanyL931

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @DanyL931

  1. Pinned Tweet
    May 18

    Just uploaded the details and exploits for the vulnerabilities addressed in iOS 12.3, It was a fun project and I hope you enjoy my work.

    Show this thread
    Undo
  2. 2 hours ago

    I can verify that CVE-2019-8593, CVE-2019-8568 and CVE-2019-8637 are still patched in iOS 12.4.

    Undo
  3. Retweeted
    6 hours ago

    OpenDrop: An Open Source AirDrop Implementation

    Undo
  4. Retweeted
    Replying to

    I don’t think any reasonable person would disagree, however, having to sit on unpatched versions for months/years in the hope of a jailbreak has its security issues too - maybe jailbreakers are unlikely to be the same people targetted, NSA/Gov tech peeps excluded.

    Undo
  5. Retweeted
    20 hours ago

    Very true. Think of all the people that have no interest and/or have never even heard of a jailbreak that are currently at risk.

    Undo
  6. 20 hours ago

    I know the community is happy to get a jb on the latest version, but there is a reason why those don't exists anymore - it's not that it's harder or that it was commercialised, It's because there's a real danger involved It's damn serious & I hope Apple will issue an update soon

    Undo
  7. 21 hours ago

    I wonder what the advisory would say about this..

    Show this thread
    Undo
  8. 22 hours ago
    Show this thread
    Undo
  9. Aug 17

    Agh I was able to trigger this on iOS but it turns out I missed a call to realloc and was reading uninitialised memory :/ I'll keep looking..

    Show this thread
    Undo
  10. Aug 15

    I just realized I uploaded the crash for the wrong state. It’s the same vulnerability, although one hits an assertion while the other will happily write.

    Undo
  11. Aug 14

    I also found a DOS vulnerability while researching this.. Not very interesting tho..

    Show this thread
    Undo
  12. Aug 14

    Arghh finally triggered the OOB write from the iOS sandbox. It was A LOT more complicated and I still have my doubts about triggering the leak, but let’s see.. Oh and I can trigger the OOB write in 2 different processes now 😉 and yes, it does work on iOS 13 as well.

    Show this thread
    Undo
  13. Aug 12

    So the first is not reachable & I can't leak with the other as it's usually interpreted as an invalid input.. I did find yet another OOB read, leaking the same area where I can also write, but once I leak I can't write to the same buffer :/ Heap fang shui it is I guess🤷‍♂️

    Show this thread
    Undo
  14. Aug 12
    Undo
  15. Aug 11

    I haven't followed the whole path yet but It looks like I might have an OOB write as well. It's a whole treasure out here :P

    Show this thread
    Undo
  16. Aug 11

    Found 2 OOB read (with controllable sizes) in some XPC service, affecting all Apple's operating systems (including latest betas). I still need a proper research env so I could craft my own payload and see if it leaks something interesting, but that's good enough for today ;-)

    Show this thread
    Undo
  17. Retweeted
    Aug 11

    Porting Sark to IDA 7.4... Should I keep the names of things IDA renamed? Or should I break compatibility where names have been changed? Why?

    Undo
  18. Aug 10

    Shoutout to and for their crazy and journey! Defiantly worth a read ;)

    Undo
  19. Retweeted
    Aug 10

    New: the coolest thing I've thing in Vegas all week. gave me a demo of his malicious iPhone lightning cable. Looks and works just like the real thing. But it has an implant, letting a hacker remotely control a victim's Mac. Popped terminal on my Mac

    Show this thread
    Undo
  20. Retweeted
    Aug 8

    ”There’s this TCL testing tool. Which is called TESTCL, unfortunately. I did not choose the name” – at .

    Undo
  21. Retweeted
    Aug 8
    Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·