Tweetovi

Blokirali ste korisnika/cu @alephsecurity

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @alephsecurity

  1. proslijedio/la je Tweet
    27. sij

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

    Poništi
  2. proslijedio/la je Tweet
    15. sij

    Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary! Hope that will help you too :)

    Poništi
  3. 14. sij

    Ruckus vulnerability research by is now online, several critical vulnerabilities found. Check it out:

    Poništi
  4. 29. pro 2019.

    Phishing is anyone's problem, but now it can get you in ways you didn't expect and for many users, no proper mitigation is currently available. Check it out:

    Poništi
  5. proslijedio/la je Tweet
    23. pro 2019.

    I am excited to present my vulnerability research this Saturday at ! I will show three different RCEs that I discovered on Ruckus Wireless access points. I hope check for updates often :)

    Poništi
  6. proslijedio/la je Tweet
    9. pro 2019.

    Simplifying iOS Research: Booting the iOS Kernel to an Interactive Bash Shell on QEMU by

    Poništi
  7. proslijedio/la je Tweet
    4. pro 2019.

    It was an honor to present our research at . Thanks everyone for attending. It was a pleasure to see the interest of the community and we promise to keep the progress going. For everyone who missed the talk:

    Poništi
  8. proslijedio/la je Tweet
    4. pro 2019.

    Booting the iOS Kernel to an Interactive Bash Shell on QEMU at by

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    4. pro 2019.

    The effort went through to get iOS booting and running bash over serial in QEMU was pretty amazing. Grab it before “legal consequences” might accrue. Great work man.

    Poništi
  10. proslijedio/la je Tweet
    20. stu 2019.

    Presenting our research "iOS on QEMU" at this December! Will talk about the journey we went through to get an unpatched iOS kernel to boot on QEMU running an interactive bash shell with a full kernel debugger attached.

    Poništi
  11. 2. ruj 2019.

    Found a cool & fast way to break (not only) weak PRNG algorithms. Check it out.

    Poništi
  12. 15. srp 2019.

    Part 3 of the series about Xiaomi is up! Live debugging of Jennic's arch on a cheap Chinese development board.

    Poništi
  13. 9. srp 2019.

    Researching obscure architectures sounds challenging to you? We thought so too, so we developed a disassembly and analysis plugin for to make things easier! Read on to learn how we did it.

    Poništi
  14. 1. srp 2019.

    Ready for some strange architectures in IoT devices? Here's the first post in a series about Xiaomi's ZigBee-based Smart Plug.

    Poništi
  15. 25. lip 2019.

    bash on iOS on QEMU, the second post is here! Check out the research behind the published code.

    Poništi
  16. 17. lip 2019.

    We hacked our way to executing an interactive bash shell on iOS on QEMU. We based the research on the work done by . Thanks!

    Poništi
  17. 2. lip 2019.

    Thanks to for a great CTF in the conference in Tel Aviv. We a had a good time time solving the challenges and pwning your CTF server :)

    Poništi
  18. 22. lis 2018.

    Our thoughts on StackOverflowException and some related vulnerabilities we found.

    Poništi
  19. 26. lip 2018.

    We looked into the Spectre browser mitigations and this is what we found.

    Poništi
  20. 22. sij 2018.

    Exploiting Qualcomm EDL Programmers: Memory & Storage based attacks allowing PBL extraction, rooting, secure boot bypassing & bootloader chain debugging/tracing. Multiple Qualcomm based mobile devices affected (5-part blog post)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·