b0untea

@b0untea

Android security researcher, engineer.

Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @b0untea

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @b0untea

  1. proslijedio/la je Tweet
    Poništi
  2. proslijedio/la je Tweet
    9. pro 2019.

    TEE Exploitation by Example: Exploiting Trusted Apps in ’s TEE - Eloi Sanfelix ( ) - INFILTRATE 2019 . Video:

    Poništi
  3. proslijedio/la je Tweet
    21. stu 2019.

    Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

    Poništi
  4. proslijedio/la je Tweet
    20. stu 2019.

    KNOX Kernel Mitigation Bypasses - New Reliable Android Kernel Root Exploitation Part #2 [SLIDES]

    Poništi
  5. proslijedio/la je Tweet
    13. stu 2019.

    Last and FATAL HW exploit on ESP32. Using this, an attacker is now able to decrypt the firmware and install its own (encrypted) malware PERSISTENTLY. No Fix on current ESP32 , vuln is here forever 😮 Enjoy:

    Poništi
  6. proslijedio/la je Tweet
    6. stu 2019.

    Text-To-Speech speaks pwned: writeup for CVE-2019-16253, how a benign TTS language pack lead to system shell.

    Poništi
  7. proslijedio/la je Tweet
    24. lis 2019.

    [BLOG] Analysis of Qualcomm Secure Boot Chains Nice work by Elouan during his internship: congrats :)

    Poništi
  8. proslijedio/la je Tweet
    3. lis 2019.

    Kernel privilege escalation bug in Android affecting fully patched Pixel 2 & others. Reported under 7 day deadline due to evidence of in-the-wild exploit. and I quickly wrote a POC to get arbitrary kernel r/w using this bug, released in tracker.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    2. lis 2019.

    How a double-free bug in WhatsApp turns to RCE

    Poništi
  10. proslijedio/la je Tweet
    1. ruj 2019.
    Poništi
  11. proslijedio/la je Tweet
    1. ruj 2019.

    The Disclosure about Esp32 security continues. This time, it's a secure boot bypass using voltage glitching: No way to fix it except hardware revision🥶. Stay tuned for the final act.

    Poništi
  12. proslijedio/la je Tweet
    29. kol 2019.

    thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    12. kol 2019.
    Poništi
  14. proslijedio/la je Tweet
    13. kol 2019.

    Update the Slides: The vulnerability that allows arbitrary read/write Linux Kernel memory from Modem is CVE-2019-10538, which already fixed in the August Android Security Bulletin

    Poništi
  15. proslijedio/la je Tweet
    12. kol 2019.
    Poništi
  16. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    6. kol 2019.

    Hello everyone, long time no see! Now begins a series of blog posts about bugs I found and reported of various Android vendors. This very first one is about the exploit chain we used to get remote arbitrary application install on Galaxy S8. Plz enjoy:

    Poništi
  18. proslijedio/la je Tweet
    8. kol 2019.

    Stuck in the sandbox? We've got your back! Deep dive analysis and full exploit of a Chrome IndexedDB race condition by and :

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    18. lip 2019.

    I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities!

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    26. svi 2019.

    Any guess how to find races through fuzzing? Here's our approach, Razzer (), which found 16 new race bugs in the Linux kernel

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·