Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @bla5r
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bla5r
-
Prikvačeni tweet
Check out the first article of a blog series about Android application diffing I wrote with
@rh0main. Use cases coming soon.https://twitter.com/quarkslab/status/1121037018690215936 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bla5r proslijedio/la je Tweet
[BLOG+TOOL] QBDI 0.7.0 https://blog.quarkslab.com/qbdi-070.html Add X86, android-X86, android-X86_64 and a use case on Tencent Packer.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Whenever accessing Facebook through UC Browser, there’re no requests to any legitimate servers but shady encrypted requests over HTTP. Invisible from UI, even lock icon shows up. Weird af.
pic.twitter.com/80KOyK78ez
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bla5r proslijedio/la je Tweet
WhatsApp Protocol Decryption for Chat Manipulation and More
#MobileSecurity by@_CPResearch_https://research.checkpoint.com/black-hat-2019-whatsapp-protocol-decryption-for-chat-manipulation-and-more/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bla5r proslijedio/la je Tweet
new article: how to debug native android libs with gdbhttps://twitter.com/pentestblog/status/1151817142557433857 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bla5r proslijedio/la je Tweet
New open source tool for LTE, GSM and 3G mobile radio monitoring and protocol analysis in Python: QCsuper https://labs.p1sec.com/2019/07/09/presenting-qcsuper-a-tool-for-capturing-your-2g-3g-4g-air-traffic-on-qualcomm-based-phones/ …
#LTE#GSM#Security#MobileRadioHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bla5r proslijedio/la je Tweet
[BLOG] Android Native Library Analysis with QBDI by
@rh0main https://blog.quarkslab.com/android-native-library-analysis-with-qbdi.html … Dynamic binary instrumentation to reverse engineer an Android JNI library. Yes, our DBI is improving its ARM support :)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Why having a hard time setting up E2E encryption when it can be that simple? I mean WHY?pic.twitter.com/r7mksggom6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Finally, here's the third (and last) article of the blog series
@rh0main and I wrote about Android application diffing. Hope you guys enjoyed it!https://twitter.com/quarkslab/status/1129003421858766848 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The second part of the blog series is out. It is about how to investigate a security patch through application diffing.https://twitter.com/quarkslab/status/1123935128735158273 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bla5r proslijedio/la je Tweet
Did you ever feel like you need to calculate a similarity-preserving hash over some data from a kernel module (for example to check if a newly-executable code region is "similar" to something known)? I wrote some code for this a few weeks ago.https://github.com/optimyze/simple_simhash/blob/master/README.md …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bla5r proslijedio/la je Tweet
As diff based analysis is pretty useful in reverse engineering, here is the first part of a blog post series from
@quarkslab : https://blog.quarkslab.com/android-application-diffing-engine-overview.html … Nice work@bla5r!pic.twitter.com/HyM5sMoIeH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bla5r proslijedio/la je Tweet
Apache Local Root: CVE-2019-0211: Vulnerability description. Exploit will come later.https://cfreal.github.io/carpe-diem-cve-2019-0211-apache-local-root.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Obviously I’m talking about pages accessed over both HTTP and HTTPS.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
However problem gets bigger: an attacker could pretty easily take advantage of those communications to spy on someone’s web browsing or steal secrets.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It clearly looks like a spying mechanism hidden behind something that developers promote as an anti-phishing feature.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Found out that a popular ‘privacy-oriented’ Android web browser is a bit too chatty.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bla5r proslijedio/la je Tweet
Here are some research related to Android runtime restrictions: - PDF: https://github.com/quarkslab/android-restriction-bypass/blob/master/report.pdf … - Blog Post: https://blog.quarkslab.com/android-runtime-restrictions-bypass.html … - Github: https://github.com/quarkslab/android-restriction-bypass … cc
@quarkslabpic.twitter.com/czDKW5kla1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Trying to write a PoC for CVE-2019-1987. Got something kinda interesting so far.pic.twitter.com/h993XQ0Rz7
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.