Min(Spark) Zheng

@SparkZheng

Android/iOS Senior Security Engineer @ Alibaba, CUHK PhD, a member of Blue-lotus and Insight-labs, worked in FireEye , Baidu and Tencent.

Vrijeme pridruživanja: prosinac 2013.

Tweetovi

Blokirali ste korisnika/cu @SparkZheng

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SparkZheng

  1. Prikvačeni tweet
    9. kol 2019.
    Poništi
  2. prije 7 sati

    finally, it comes! XNU ( kernel of iOS 13 and macOS 10.15) source code: new mitigation and new bypass. :-)

    Poništi
  3. 10. sij
    Poništi
  4. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    5. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    9. stu 2019.

    iOS 13 mitigated a technique that could be used (and was used) to disable sandbox operations system-wide (without any dynamic patches/daemon). As such I am open-sourcing my implementation of this patch (which was also used in unc0ver)

    Prikaži ovu nit
    Poništi
  7. 10. stu 2019.
    Poništi
  8. 29. lis 2019.

    Building a third-party iOS kernel extension is great~👍

    Poništi
  9. 29. ruj 2019.

    Amazing~! No need to use a private JB to get a 0-day research environment now~! We can have a JB environment on the latest iOS version with checkm8. It will help researchers to test and find kernel bugs for untethered jailbreak.

    Poništi
  10. proslijedio/la je Tweet

    Non techie version: Any iPhone 8/X or earlier can now be: - booted to any iOS version, past/present/future, with no SHSH/APTickets - booted to any OS (e.g. Android) - compromised by attacker w/physical access, but still requires password (or brute force)for private data

    Poništi
  11. 27. ruj 2019.
    Poništi
  12. 29. kol 2019.

    Nice job... and this report exposed a non-public and useful vulnerability I discovered earlier ... 😭😭😭

    Poništi
  13. 18. kol 2019.
    Poništi
  14. proslijedio/la je Tweet
    8. kol 2019.
    Poništi
  15. proslijedio/la je Tweet
    9. kol 2019.

    In case you missed 's talk at this week, here is a video showing a remote exploit for one of the iMessage bugs we found: Be sure to read if you are interested in these kinds of attacks!

    Poništi
  16. 8. kol 2019.
    Poništi
  17. 8. kol 2019.

    Apple’s new bounty program(includes macOS) and 0-click JB = $1,000,000~🎊🎊🎊

    Poništi
  18. 8. kol 2019.

    Just finished my talk at BlackHat USA 2019~😀

    Poništi
  19. 1. kol 2019.

    A very powerful bug. Remotely stole files through iMessage DEMO (CVE-2019-8646 find by ):

    Poništi
  20. proslijedio/la je Tweet
    25. srp 2019.

    Hello world! A few thoughts on how Apple BLE works (spoiler: it is possible to get your phone number while you're using your Apple Device)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·