Tweets

You blocked @benhawkes

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @benhawkes

  1. Retweeted
    Jan 30

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Undo
  2. Jan 9

    Quick reminder that we're still updating the "0day detected in-the-wild" spreadsheet here: . The first entry for 2020 is now in the books -- CVE-2019-17026 is a type confusion issue in the JIT engine for Firefox, detected in active attacks by Qihoo 360 ATA.

    Undo
  3. Jan 9

    Project Zero blog: "Remote iPhone Exploitation Part 3: From Memory Corruption to JavaScript and Back -- Gaining Code Execution" by Samuel Groß () --

    Undo
  4. Jan 9

    Project Zero blog: "Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass" by Samuel Groß () --

    Undo
  5. Retweeted
    Jan 9

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Show this thread
    Undo
  6. Jan 9

    Project Zero blog: "Remote‌ ‌iPhone‌ ‌Exploitation‌ ‌Part‌ ‌1:‌ ‌Poking‌ ‌Memory‌ ‌via‌ ‌iMessage‌ ‌and‌ ‌CVE-2019-8641‌" by Samuel Groß () --

    Undo
  7. Retweeted
    Jan 7

    Kudos to the GPZ team for their willingness to explore new vulnerability disclosure policies in addition to doing great research :) At the risk of wading into a disclosure debate (plz no), I think these policy changes will help improve customer safety

    Undo
  8. Retweeted
    Jan 7

    At Google Project Zero, the team spends a *lot* of time discussing and evaluating vulnerability disclosure policies and their consequences. It's a complex and controversial topic! Here's P0's policy changes for 2020 (with our rationale for the changes):

    Undo
  9. Jan 7
    Undo
  10. Retweeted
    17 Dec 2019

    New blog post outlining how to use my .NET RPC Client tooling from PowerShell and C# to test and exploit local RPC security vulnerabilities. Also an early xmas present for those who enjoy long standing design flaws in UAC :-)

    Undo
  11. 11 Dec 2019

    New guidance on Linux-stable Merges for Android: -- looks positive, reducing the patch gap for upstream kernel security bugs is really important. The window of exposure for publicly known issues is too long at the moment.

    Undo
  12. Retweeted

    I'm really excited about this video. It has been in the making for a long time. It's a video with about his SockPuppet vulnerability in the XNU (iOS/Mac) Kernel and was used for jailbreaking. Haxember #10

    Show this thread
    Undo
  13. Retweeted
    10 Dec 2019

    Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow!

    Undo
  14. 10 Dec 2019

    Project Zero blog: "SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4" by Ned Williamson () --

    Undo
  15. Retweeted

    Blog post about the work Google's Threat Analysis Group (TAG) does. Targeted phishing stats, Sandworm campaign details and disinfo campaign takedowns. We plan to do more of these.

    Undo
  16. Retweeted
    21 Nov 2019

    Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

    Undo
  17. 21 Nov 2019

    Project Zero blog: "Bad Binder: Android In-The-Wild Exploit" by Maddie Stone () - 

    Undo
  18. Retweeted
    28 Oct 2019

    KTRW was motivated by the desire to see better and more open tooling for security research on iPhones. Read about the journey to find the KTRR bypass:

    Show this thread
    Undo
  19. Retweeted
    28 Oct 2019

    I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB:

    Show this thread
    Undo
  20. Retweeted
    17 Aug 2019

    In multiple recent disclosure discussions on Twitter, I had said I will write a longer blog post about my views. I finally found the time to jot them down. I expect almost every reader to disagree with something vehemently. Enjoy "Disclosure Rashomon":

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·