Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Simone_Ferrini
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Simone_Ferrini
-
Challenge accepted: I’m switching off all my electronic devices for the next two weeks of vacation. Let’s see how long I can resist being completely offline
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
0x41con 3rd [time is a charm] edition: 1-2 May 2020, Thessaloniki, Greece /cc
@_argpHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
New blog post. ARM hardware bug. In the specification. https://siguza.github.io/PAN/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
No CCC for me this year, have fun guys! And I’ll see ya all at next
@0x41con :PHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
Merry Christmas! May many 0days show up under your Xmas tree.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
(How does that even happen? Well, one of these types stores its capacity at the offset where the other one stores its buffer pointer
)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4 https://googleprojectzero.blogspot.com/2019/12/sockpuppet-walkthrough-of-kernel.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
Mac secure boot (with two world firsts: DMA defense from PCIe Bus 0, and the Option ROM sandbox), iOS kernel integrity, Pointer Auth Codes (PAC), APRR register, Page Protection Layer (PPL), and novel Find My crypto — all in my slides from Black Hat 2019! https://i.blackhat.com/USA-19/Thursday/us-19-Krstic-Behind-The-Scenes-Of-IOS-And-Mas-Security.pdf …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
I'm presenting on KTRW at
#36C3 this year. I'll take you along my journey discovering hardware debugging registers and discuss the challenges of writing a full-featured iOS kernel debugger usable with LLDB: https://halfnarp.events.ccc.deHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
checkra1n beta 0.9 is now available at https://checkra.in ! - this is an early release and as such you should not be running it on a primary release. please read the FAQ on the website for additional information. reddit:https://www.reddit.com/r/jailbreak/comments/dub9ke/release_checkra1n_beta_09/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just donated to
#TeamTrees, if you can, donate too.https://www.teamtrees.orgHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
sferrini proslijedio/la je Tweet
KTRW was motivated by the desire to see better and more open tooling for security research on iPhones. Read about the journey to find the KTRR bypass: https://googleprojectzero.blogspot.com/2019/10/ktrw-journey-to-build-debuggable-iphone.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB:https://github.com/googleprojectzero/ktrw …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
sferrini proslijedio/la je Tweet
Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: https://gist.github.com/saelo/dd598a91a27ddd7cb9e410dc92bf37a1 … It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
made a framebuffer text thing, looks dope tbhpic.twitter.com/8PlrKS9c9T
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
Debug registers in production A11 iPhones allow full-featured kernel debugging https://bugs.chromium.org/p/project-zero/issues/detail?id=1900 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thanks to
@axi0mX for his#checkm8 exploit and to@key2fr (@LambdaConcept) for the bonobo JTAG cable! iOS debugging has never been so powerful.pic.twitter.com/2rn6sKI9Ba
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sferrini proslijedio/la je Tweet
Debugging an iPhone with Bonobo JTAG cable + OpenOCD + GDB demoted by ch...https://youtu.be/3zpwSUXlz6A
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.