Proteas

@ProteasWang

Security Researcher at Qihoo 360 Nirvan Team

Zone 3
Vrijeme pridruživanja: veljača 2012.

Tweetovi

Blokirali ste korisnika/cu @ProteasWang

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ProteasWang

  1. 19. sij

    d00139ed4f1422410fad056e83f05b418046d5b8dde5806410c0e2385d89a8e6 :)

    Poništi
  2. 14. sij

    FWD: The AArch64 backend gained definitions for missing Apple CPU names.

    Poništi
  3. 21. pro 2019.

    不管是否愿意,每一代人都有自己的历史使命或者历史局限性。

    Poništi
  4. 18. pro 2019.

    seems that Gigalocker is kind of filesystem integrity protection mechanism.

    Poništi
  5. 9. pro 2019.

    how to disable arm macro instruction? Options>General…>Analysis>Kernel option3>Enable macro, uncheck it.

    Poništi
  6. proslijedio/la je Tweet
    7. stu 2019.
    Poništi
  7. 29. lis 2019.

    Binary Format of iOS 13 Sandbox Profile Collection:

    Poništi
  8. 29. lis 2019.

    Reported some iOS kernel bugs to product-security[AT]apple[DOT]com 2 hours ago, but didn’t received any auto-reply. so where are my bugs...

    Poništi
  9. proslijedio/la je Tweet
    28. lis 2019.

    KTRW was motivated by the desire to see better and more open tooling for security research on iPhones. Read about the journey to find the KTRR bypass:

    Prikaži ovu nit
    Poništi
  10. 22. lis 2019.
    Poništi
  11. 28. ruj 2019.

    希望苹果的安全人员能明白:并不是说把内裤穿到外面,你们就是安全领域的超人。你们应该对社区保持尊重,并依赖社区的力量把安全做好。

    Poništi
  12. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  13. 25. ruj 2019.

    iOS 13.1, maild is in sandbox now. maybe something happened.

    Poništi
  14. 12. ruj 2019.

    14G60, AppleSEPOS-438.60.1 17A5837a, AppleSEPOS-1267.0.12

    Poništi
  15. 11. ruj 2019.

    17A577, .WebKit.WebContent: (allow syscall-unix (syscall-mask 531)).

    Poništi
  16. 3. ruj 2019.
    Poništi
  17. proslijedio/la je Tweet
    29. kol 2019.

    thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.

    Prikaži ovu nit
    Poništi
  18. 29. kol 2019.

    Coverage Guided Code Auditing on XNU, xnu auditing method/trick.

    Poništi
  19. 28. kol 2019.

    iOS kernelcache symbols recovery: iOS 13.1, iPhone11,6, functions, 61892/88375, 70.03%

    Poništi
  20. 18. kol 2019.

    This is not the 1st time that apple made this kind of mistake, so there are some issues in apple’s multi-branch development process management.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·