sferrini

@Simone_Ferrini

Security Researcher. Interested in RE, hardware and low-level binary stuff. Occasional CTF player (pwn only)

0xfffffff041414141
Vrijeme pridruživanja: srpanj 2011.

Tweetovi

Blokirali ste korisnika/cu @Simone_Ferrini

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Simone_Ferrini

  1. 1. velj

    Challenge accepted: I’m switching off all my electronic devices for the next two weeks of vacation. Let’s see how long I can resist being completely offline 😅

    Poništi
  2. proslijedio/la je Tweet
    21. sij

    0x41con 3rd [time is a charm] edition: 1-2 May 2020, Thessaloniki, Greece /cc

    Poništi
  3. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  4. 26. pro 2019.

    No CCC for me this year, have fun guys! And I’ll see ya all at next :P

    Poništi
  5. proslijedio/la je Tweet
    25. pro 2019.

    Merry Christmas! May many 0days show up under your Xmas tree.

    Poništi
  6. proslijedio/la je Tweet
    20. pro 2019.

    (How does that even happen? Well, one of these types stores its capacity at the offset where the other one stores its buffer pointer 😭)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4

    Poništi
  8. proslijedio/la je Tweet
    22. stu 2019.

    Mac secure boot (with two world firsts: DMA defense from PCIe Bus 0, and the Option ROM sandbox), iOS kernel integrity, Pointer Auth Codes (PAC), APRR register, Page Protection Layer (PPL), and novel Find My crypto — all in my slides from Black Hat 2019!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    19. stu 2019.

    I'm presenting on KTRW at this year. I'll take you along my journey discovering hardware debugging registers and discuss the challenges of writing a full-featured iOS kernel debugger usable with LLDB:

    Poništi
  10. proslijedio/la je Tweet
    10. stu 2019.

    checkra1n beta 0.9 is now available at ! - this is an early release and as such you should not be running it on a primary release. please read the FAQ on the website for additional information. reddit:

    Prikaži ovu nit
    Poništi
  11. 31. lis 2019.

    Just donated to , if you can, donate too.

    Poništi
  12. proslijedio/la je Tweet
    31. lis 2019.
    Poništi
  13. proslijedio/la je Tweet
    28. lis 2019.

    KTRW was motivated by the desire to see better and more open tooling for security research on iPhones. Read about the journey to find the KTRR bypass:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    28. lis 2019.

    I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    27. lis 2019.
    Poništi
  16. proslijedio/la je Tweet
    27. lis 2019.

    Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)

    Poništi
  17. proslijedio/la je Tweet
    9. lis 2019.

    made a framebuffer text thing, looks dope tbh

    Poništi
  18. proslijedio/la je Tweet
    3. lis 2019.

    Debug registers in production A11 iPhones allow full-featured kernel debugging

    Poništi
  19. 3. lis 2019.

    Thanks to for his exploit and to () for the bonobo JTAG cable! iOS debugging has never been so powerful.

    Poništi
  20. proslijedio/la je Tweet
    27. ruj 2019.

    Debugging an iPhone with Bonobo JTAG cable + OpenOCD + GDB demoted by ch...

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·