Tweets

You blocked @alephsecurity

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @alephsecurity

  1. Retweeted
    Jan 27

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

    Undo
  2. Retweeted
    Jan 15

    Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary! Hope that will help you too :)

    Undo
  3. Jan 14

    Ruckus vulnerability research by is now online, several critical vulnerabilities found. Check it out:

    Undo
  4. 29 Dec 2019

    Phishing is anyone's problem, but now it can get you in ways you didn't expect and for many users, no proper mitigation is currently available. Check it out:

    Undo
  5. Retweeted
    23 Dec 2019

    I am excited to present my vulnerability research this Saturday at ! I will show three different RCEs that I discovered on Ruckus Wireless access points. I hope check for updates often :)

    Undo
  6. Retweeted
    9 Dec 2019

    Simplifying iOS Research: Booting the iOS Kernel to an Interactive Bash Shell on QEMU by

    Undo
  7. Retweeted
    4 Dec 2019

    It was an honor to present our research at . Thanks everyone for attending. It was a pleasure to see the interest of the community and we promise to keep the progress going. For everyone who missed the talk:

    Undo
  8. Retweeted
    4 Dec 2019

    Booting the iOS Kernel to an Interactive Bash Shell on QEMU at by

    Show this thread
    Undo
  9. Retweeted
    4 Dec 2019

    The effort went through to get iOS booting and running bash over serial in QEMU was pretty amazing. Grab it before “legal consequences” might accrue. Great work man.

    Undo
  10. Retweeted
    20 Nov 2019

    Presenting our research "iOS on QEMU" at this December! Will talk about the journey we went through to get an unpatched iOS kernel to boot on QEMU running an interactive bash shell with a full kernel debugger attached.

    Undo
  11. 2 Sep 2019

    Found a cool & fast way to break (not only) weak PRNG algorithms. Check it out.

    Undo
  12. 15 Jul 2019

    Part 3 of the series about Xiaomi is up! Live debugging of Jennic's arch on a cheap Chinese development board.

    Undo
  13. 9 Jul 2019

    Researching obscure architectures sounds challenging to you? We thought so too, so we developed a disassembly and analysis plugin for to make things easier! Read on to learn how we did it.

    Undo
  14. 1 Jul 2019

    Ready for some strange architectures in IoT devices? Here's the first post in a series about Xiaomi's ZigBee-based Smart Plug.

    Undo
  15. 25 Jun 2019

    bash on iOS on QEMU, the second post is here! Check out the research behind the published code.

    Undo
  16. 17 Jun 2019

    We hacked our way to executing an interactive bash shell on iOS on QEMU. We based the research on the work done by . Thanks!

    Undo
  17. 2 Jun 2019

    Thanks to for a great CTF in the conference in Tel Aviv. We a had a good time time solving the challenges and pwning your CTF server :)

    Undo
  18. 22 Oct 2018

    Our thoughts on StackOverflowException and some related vulnerabilities we found.

    Undo
  19. 26 Jun 2018

    We looked into the Spectre browser mitigations and this is what we found.

    Undo
  20. 22 Jan 2018

    Exploiting Qualcomm EDL Programmers: Memory & Storage based attacks allowing PBL extraction, rooting, secure boot bypassing & bootloader chain debugging/tracing. Multiple Qualcomm based mobile devices affected (5-part blog post)

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·