Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @b0untea
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @b0untea
-
b0untea proslijedio/la je Tweet
My
@PacSecjp slides on Insecure Boot are now available here:https://github.com/abarisani/abarisani.github.io/tree/master/research/secure_boot …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
TEE Exploitation by Example: Exploiting Trusted Apps in
@Samsung’s TEE - Eloi Sanfelix (@esanfelix ) - INFILTRATE 2019@InfiltrateCon. Video:https://vimeo.com/335947683Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018. https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
KNOX Kernel Mitigation Bypasses - New Reliable Android Kernel Root Exploitation Part #2
#MobileSecurity#AndroidSecurity#POC2019 [SLIDES] http://powerofcommunity.net/poc2019/x82.pdf pic.twitter.com/mLnykwWM6b
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
Last and FATAL HW exploit on ESP32. Using this, an attacker is now able to decrypt the firmware and install its own (encrypted) malware PERSISTENTLY. No Fix on current ESP32 , vuln is here forever
Enjoy:
https://limitedresults.com/2019/11/pwn-the-esp32-forever-flash-encryption-and-sec-boot-keys-extraction/ …
#FatalFuryonESP32#ESP32#EspressifSystemspic.twitter.com/wkZm8aGF3l
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
https://blog.flanker017.me/text-to-speech-speaks-pwned/ … Text-To-Speech speaks pwned: writeup for CVE-2019-16253, how a benign TTS language pack lead to system shell.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
[BLOG] Analysis of Qualcomm Secure Boot Chains https://blog.quarkslab.com/analysis-of-qualcomm-secure-boot-chains.html … Nice work by Elouan during his internship: congrats :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
Kernel privilege escalation bug in Android affecting fully patched Pixel 2 & others. Reported under 7 day deadline due to evidence of in-the-wild exploit.
@tehjh and I quickly wrote a POC to get arbitrary kernel r/w using this bug, released in tracker. https://bugs.chromium.org/p/project-zero/issues/detail?id=1942 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
How a double-free bug in WhatsApp turns to RCEhttps://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
Launching feedback-driven fuzzing on TrustZone TEE
#MobileSecurity#AndroidSecurity#HITBGSEC2019 [SLIDES] by@e13fter https://gsec.hitb.org/materials/sg2019/D2%20-%20Launching%20Feedback-Driven%20Fuzzing%20on%20TrustZone%20TEE%20-%20Andrey%20Akimov.pdf …pic.twitter.com/3FlXpFrBr2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
The Disclosure about Esp32 security continues. This time, it's a secure boot bypass using voltage glitching: https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/ … No way to fix it except hardware revision
.
Stay tuned for the final act.
#Esp32#EspressifSystemspic.twitter.com/1SQHZIAlHG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html … thanks to
@_clem1,@5aelo for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone
#MobileSecurity#AndroidSecurity#BHUSA2019 by@GXiling SLIDES: https://i.blackhat.com/USA-19/Wednesday/us-19-Gong-Bypassing-The-Maginot-Line-Remotely-Exploit-The-Hardware-Decoder-On-Smartphone.pdf … PAPER: https://i.blackhat.com/USA-19/Wednesday/us-19-Gong-Bypassing-The-Maginot-Line-Remotely-Exploit-The-Hardware-Decoder-On-Smartphone-wp.pdf …pic.twitter.com/LwgHA1B2zg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
Update the Slides: The vulnerability that allows arbitrary read/write Linux Kernel memory from Modem is CVE-2019-10538, which already fixed in the August Android Security Bulletinhttps://twitter.com/mobilesecurity_/status/1161012639948058624 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
b0untea proslijedio/la je Tweet
Paged Out! #1 is out! (and it's free to download!) https://pagedout.institute/?page=issues.php … There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy!
#PagedOut!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
Hello everyone, long time no see! Now begins a series of blog posts about bugs I found and reported of various Android vendors. This very first one is about the exploit chain we used to get remote arbitrary application install on Galaxy S8. Plz enjoy:https://blog.flanker017.me/galaxy-leapfrogging-pwning-the-galaxy-s8/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
Stuck in the sandbox? We've got your back! Deep dive analysis and full exploit of a Chrome IndexedDB race condition by
@DimitriFourny and@moritzj: https://labs.bluefrostsecurity.de/blog/2019/08/08/escaping-the-chrome-sandbox-via-an-indexeddb-race-condition/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities! https://theofficialflow.github.io/2019/06/18/trinity.html …pic.twitter.com/1DXu4UvlmT
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
b0untea proslijedio/la je Tweet
Any guess how to find races through fuzzing? Here's our approach, Razzer (https://github.com/compsec-snu/razzer …), which found 16 new race bugs in the Linux kernel
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.