Phenol

@Phenol__

Former chemistry student. Now studying at . Doing reverse-engineering and binary exploitation for fun.

Vrijeme pridruživanja: veljača 2018.

Tweetovi

Blokirali ste korisnika/cu @Phenol__

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Phenol__

  1. proslijedio/la je Tweet
    15. sij

    Que Mozilla soit en si mauvaise posture qu'ils doivent se séparer d'une partie de ses salariés est la mauvaise nouvelle du mois pour le Web. Je ne sais pas si tout le monde mesure l'imperieuse nécessité de ce projet indépendant.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    16. sij

    [BLOG] Reverse Engineering a Philips TriMedia CPU based IP Camera - Part 3 by :

    Poništi
  3. proslijedio/la je Tweet
    14. sij
    Poništi
  4. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  5. proslijedio/la je Tweet
    31. pro 2019.

    CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4)

    Poništi
  6. proslijedio/la je Tweet
    29. pro 2019.

    Pixel 3,4 devices use a custom packed img format for bootloader & radio (FBPK) that is not part of upstream EDK2 bootloader. Spent part of holidays reversing G's B1c1FastbootApp UEFI app & released an upacking tool as a side-product -

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  8. proslijedio/la je Tweet
    27. pro 2019.

    If you're interested in Samsung's TrustZone, the talk I gave at is online. It presents the work we did with and at . We are at if you want to come say hi. :)

    Poništi
  9. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.

    Two days left if you want to be qualified for the Finals to win not one, not two but THREE . 4 Teams are already qualified execve+auditd= <3

    , , i još njih 7
    Poništi
  11. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  13. proslijedio/la je Tweet
    30. stu 2019.

    As promised, here is Part 2 of my Qualcomm QDSPv6 Hexagon Reversing Blog : .Yes, it does include useful stuff such as a hexagon disassembler based on python 3 and a comparison of common plugin/tools for qc hexagon disassembly. Let the patching begin :)

    Poništi
  14. proslijedio/la je Tweet
    15. stu 2019.

    Dear twitter 🤓 followers, let's start xmas early. I officially announce the start of my bigger blog series on reversing/exploiting Qualcomm QDSPv6 modem and TZ. Part 1 over here : . Parts 2 - 4 will follow the next four weeks. Enjoy !

    Poništi
  15. proslijedio/la je Tweet

    Bravo à Greg Taube pour le write-up du Black Badge et à pour son aide !

    Poništi
  16. proslijedio/la je Tweet
    6. stu 2019.

    How complicated is cellular baseband firmware? At least this complicated: over 150K debugging messages across 932 directories and 2,775 files! Rebuilding the source code skeleton from Samsung S10's Shannon S5000 baseband debugging messages.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    2. stu 2019.

    I just did the full disclosure of the exploitable bugs in the 'vivid' driver of the Linux kernel:

    Poništi
  18. proslijedio/la je Tweet
    31. lis 2019.
    Poništi
  19. proslijedio/la je Tweet
    29. lis 2019.

    [BLOG] EEPROM: When Tearing-Off Becomes a Security Issue by

    Poništi
  20. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·