Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @jaakerblom
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jaakerblom
-
Solution for
#36c3 splitcode challenge with@qlutoohttps://gist.github.com/plutooo/211be8ec89f9cd2912d88c91964f84a5 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Curious to see which bugs will be used to pwn iOS in Tianfu Cup
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It’s not a real conference if the monitors in the venue’s lobby aren’t showing blue screens by the end
#POC2019pic.twitter.com/ZjgtxqzSRl
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
John Åkerblom proslijedio/la je Tweet
I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB:https://github.com/googleprojectzero/ktrw …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
recvmsg_x, used in one of the chains documented by
@i41nbeer here https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html … also gets tripped like this and won’t work in the iOS 13 Safari sandbox. Still works in app sandbox so still good for jailbreakershttps://twitter.com/ProteasWang/status/1171704439880552450 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
John Åkerblom proslijedio/la je Tweet
My iOS 12.2 exploit is now available! Thanks again to Brandon for his help in getting through the Mach trenches from BSD. https://bugs.chromium.org/p/project-zero/issues/detail?id=1806#c12 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
John Åkerblom proslijedio/la je Tweet
Glad that we have 2 talks accepted to
#BHUSA 2019. With@windknown , we will talk about how to exploit a kernel bug in XNU that affects iOS up to 12.1.4 against iPhone XS Max. With Tao Huang, we will talk about remote heap/stack overflows in FaceTime.@BlackHatEventsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
KASLR bypass/kernel base finding code is impacted by iOS 12.2 for jailbreaking (for some bugs/methods). Note how the kernel base isn’t always xxxxxxxxxxxx4000 anymore. Looks like KASLR has been improved
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
John Åkerblom proslijedio/la je Tweet
This team is awesome! Join us ;)https://twitter.com/gynvael/status/1107575107050971136 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
How to root/sandbox escape iOS12: proc 11.4->12 0x100->0xf8 0x10->0x60 0x268->0x250 0xa8->0xa0 0x2c0->0x2a8 0x30->0x28
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
John Åkerblom proslijedio/la je Tweet
Safari exploit for iPhone 8, iOS 11.3.1 https://github.com/phoenhex/files/tree/master/exploits/ios-11.3.1 … NOT USEFUL FOR USERS. Stage 2 is not open source so people can't abuse it easily. Won't have time to work on this more, but as a developer lmk if you want to turn this into something cool and I can share sources.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
(2/2) This is good to know as there is another overflow in mptcp_subflow_add() which has its own new check in the kernel. This one can be reached through connectx with entitlement check, but there is another path where it's not as clear if the entitlement is actually needed
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
John Åkerblom proslijedio/la je Tweet
iOS 11.4 patched kernel memory corruption bugs I reported in two distinct areas: mptcp and vfs. My exploit for the mptcp bug is here: https://bugs.chromium.org/p/project-zero/issues/detail?id=1558 … Please read the README. It requires an Apple developer cert.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Regarding multipath bugs: 3rd overflow looks reachable without entitlement. It also has a separate fix in the kernel code from the first two, which should warrant a CVE. So my current guess is 1 Ian CVE for first 2, 1 for 3rd. See mptcp_subflow_add
@s1guzahttps://twitter.com/jaakerblom/status/1003298870842011650 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The iOS 11.3.1 kernel exploit has been reliable on my test device, but some users have been reporting very low reliabiltity. A solution that worked for those who tried was to disable Siri. I've updated the repo with a note and a few details about this:https://github.com/potmdehex/multipath_kfree …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
John Åkerblom proslijedio/la je Tweet
Talked to Ian, he said one bug requires the entitlement, the other doesn't.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
To anyone banking on Ian's upcoming exploit using different bugs: could be the case, but you are overlooking what we know so far if you don't see the risk (unless you mistrust Apple): https://twitter.com/jaakerblom/status/1003266065881796610 … Surprised no one agrees. No doubt Ian will make a dope exploit though
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
To average JB users: wait for a developer like
@coolstarorg who focuses on the part after all exploitation (all public since June 1, reliability/non-X aside). He hasn't shown any interest in my 11.3.1 exploit but he is welcome to use it. My focus is research, not developmentHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Added root and sandbox escape to the iPhone X 11.3.1 exploit using QiLin by
@Morpheus______ : https://github.com/potmdehex/multipath_kfree … Anyone care to explain what the big circlejerk about tfp0 is about?@Morpheus______ has made clear in the past it's not needed for his jailbreak frameworkHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.