bla5r

@bla5r

Security research. Reverse engineering and Android stuff.

Vrijeme pridruživanja: veljača 2017.

Tweetovi

Blokirali ste korisnika/cu @bla5r

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bla5r

  1. Prikvačeni tweet
    24. tra 2019.

    Check out the first article of a blog series about Android application diffing I wrote with . Use cases coming soon.

    Poništi
  2. proslijedio/la je Tweet
    10. ruj 2019.

    [BLOG+TOOL] QBDI 0.7.0 Add X86, android-X86, android-X86_64 and a use case on Tencent Packer.

    Poništi
  3. 19. kol 2019.

    Whenever accessing Facebook through UC Browser, there’re no requests to any legitimate servers but shady encrypted requests over HTTP. Invisible from UI, even lock icon shows up. Weird af. 🤨

    Poništi
  4. proslijedio/la je Tweet
    8. kol 2019.
    Poništi
  5. proslijedio/la je Tweet
    18. srp 2019.

    🎉 new article: how to debug native android libs with gdb

    Poništi
  6. proslijedio/la je Tweet
    9. srp 2019.

    New open source tool for LTE, GSM and 3G mobile radio monitoring and protocol analysis in Python: QCsuper

    Poništi
  7. proslijedio/la je Tweet
    3. lip 2019.

    [BLOG] Android Native Library Analysis with QBDI by Dynamic binary instrumentation to reverse engineer an Android JNI library. Yes, our DBI is improving its ARM support :)

    Poništi
  8. 24. svi 2019.

    Why having a hard time setting up E2E encryption when it can be that simple? I mean WHY?

    Poništi
  9. 16. svi 2019.

    Finally, here's the third (and last) article of the blog series and I wrote about Android application diffing. Hope you guys enjoyed it!

    Poništi
  10. 2. svi 2019.

    The second part of the blog series is out. It is about how to investigate a security patch through application diffing.

    Poništi
  11. proslijedio/la je Tweet
    1. svi 2019.

    Did you ever feel like you need to calculate a similarity-preserving hash over some data from a kernel module (for example to check if a newly-executable code region is "similar" to something known)? I wrote some code for this a few weeks ago.

    Poništi
  12. proslijedio/la je Tweet
    24. tra 2019.

    As diff based analysis is pretty useful in reverse engineering, here is the first part of a blog post series from : Nice work !

    Poništi
  13. proslijedio/la je Tweet
    3. tra 2019.

    Apache Local Root: CVE-2019-0211: Vulnerability description. Exploit will come later.

    Poništi
  14. 28. ožu 2019.

    Obviously I’m talking about pages accessed over both HTTP and HTTPS.

    Prikaži ovu nit
    Poništi
  15. 28. ožu 2019.

    However problem gets bigger: an attacker could pretty easily take advantage of those communications to spy on someone’s web browsing or steal secrets.

    Prikaži ovu nit
    Poništi
  16. 28. ožu 2019.

    It clearly looks like a spying mechanism hidden behind something that developers promote as an anti-phishing feature.

    Prikaži ovu nit
    Poništi
  17. 28. ožu 2019.

    Found out that a popular ‘privacy-oriented’ Android web browser is a bit too chatty.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    27. ožu 2019.
    Poništi
  19. 4. ožu 2019.
    Prikaži ovu nit
    Poništi
  20. 3. ožu 2019.

    Trying to write a PoC for CVE-2019-1987. Got something kinda interesting so far.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·