Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @SparkZheng
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SparkZheng
-
Prikvačeni tweet
The slides of our BlackHat USA 2019 talk: https://i.blackhat.com/USA-19/Thursday/us-19-Zheng-All-Your-Apple-Are-Belong-To-Us-Unique-Identification-And-Cross-Device-Tracking-Of-Apple-Devices.pdf … Thank you~pic.twitter.com/UqPokDyA1Z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
finally, it comes! XNU ( kernel of iOS 13 and macOS 10.15) source code: https://opensource.apple.com/tarballs/xnu/xnu-6153.11.26.tar.gz … new mitigation and new bypass. :-)pic.twitter.com/3aDRVGmFnx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Min(Spark) Zheng proslijedio/la je Tweet
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Min(Spark) Zheng proslijedio/la je Tweet
Trust in Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol
#MobileSecurity#iOSsecurity#IoTSecurity#BHEU2019 [SLIDES] by Ta-Lun Yen https://i.blackhat.com/eu-19/Thursday/eu-19-Yen-Trust-In-Apples-Secret-Garden-Exploring-Reversing-Apples-Continuity-Protocol-3.pdf …pic.twitter.com/yw8OH0z1S7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Min(Spark) Zheng proslijedio/la je Tweet
iOS 13 mitigated a technique that could be used (and was used) to disable sandbox operations system-wide (without any dynamic patches/daemon). As such I am open-sourcing my implementation of this patch (which was also used in unc0ver)https://gist.github.com/jakeajames/5ee29a99107cdd2fd665b468f9f8e664 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Building a third-party iOS kernel extension is great~
https://twitter.com/_bazad/status/1188878656258691072 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Amazing~! No need to use a private JB to get a 0-day research environment now~! We can have a JB environment on the latest iOS version with checkm8. It will help researchers to test and find kernel bugs for untethered jailbreak.https://twitter.com/axi0mX/status/1178299323328499712 …
0:32Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Min(Spark) Zheng proslijedio/la je Tweet
Non techie version: Any iPhone 8/X or earlier can now be: - booted to any iOS version, past/present/future, with no SHSH/APTickets - booted to any OS (e.g. Android) - compromised by attacker w/physical access, but still requires password (or brute force)for private data
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Nice job... and this report exposed a non-public and useful vulnerability I discovered earlier ...


https://twitter.com/i41nbeer/status/1167236114941431809 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Min(Spark) Zheng proslijedio/la je Tweet
slides for Facetime vulnerabilities available at http://i.blackhat.com/USA-19/Thursday/us-19-Huang-Towards-Discovering-Remote-Code-Execution-Vulnerabilities-In-Apple-FaceTime.pdf … and slides for iPhone XS kernel vulnerabilities available at http://i.blackhat.com/USA-19/Thursday/us-19-Wang-Attacking-IPhone-XS-Max.pdf … pls enjoy!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Min(Spark) Zheng proslijedio/la je Tweet
In case you missed
@natashenka's talk at@BlackHatEvents this week, here is a video showing a remote exploit for one of the iMessage bugs we found: https://youtu.be/E_9kBFKNx54 Be sure to read https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html … if you are interested in these kinds of attacks!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
welcome to see our booth @ blackhat~


https://twitter.com/AsrcSecurity/status/1159141217721970689 …
0:14Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Apple’s new bounty program(includes macOS) and 0-click JB = $1,000,000~


pic.twitter.com/RLu7bPY5z7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just finished my talk at BlackHat USA 2019~
@bxl1989@BlackHatEventspic.twitter.com/JsJTgwB2io
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A very powerful bug. Remotely stole files through iMessage DEMO (CVE-2019-8646 find by
@natashenka):https://www.youtube.com/watch?v=ld2m0CPR1nM …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Min(Spark) Zheng proslijedio/la je Tweet
Hello world! A few thoughts on how Apple BLE works (spoiler: it is possible to get your phone number while you're using your Apple Device) https://hexway.io/blog/apple-bleee/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
