littlelailo

@littlelailo

interested in RE and pwning stuff | hacking *OS atm

ROM
Vrijeme pridruživanja: rujan 2015.

Tweetovi

Blokirali ste korisnika/cu @littlelailo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @littlelailo

  1. 28. sij

    I just realized that CPA is also short for correlation power analysis, I meant chosen plaintext attack. Sry if that causes confusion :|

    Prikaži ovu nit
    Poništi
  2. 27. sij

    From looking at the AES spec it seems like it's not a huge improvement because the second round key differs (and with that each other round key?), but I still wanna know :p

    Prikaži ovu nit
    Poništi
  3. 27. sij

    Question to the crypto ppl: is there a known attack on AES, that deals with the fact that the same key is used for an AES128/192 and AES256 encryption (talking about CPA attacks and one half of the 256 bit key == 128 bit key). Just wonderd what the complexity of such an attack is

    Prikaži ovu nit
    Poništi
  4. 1. sij

    2019 has been a really cool year. I found some good bugs, met awesome ppl and had a lot of fun in the IT world as well as the "real" world. Thanks to all the people who help me achieving my dreams and let's see what the next decade offers!

    Poništi
  5. 30. pro 2019.

    was super cool this year. Had a lot of fun and it was awesome to see y'all. Till next year and have fun hacking all the things ;)

    Poništi
  6. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  7. 25. pro 2019.

    Let's go See you all @ :)

    Poništi
  8. 10. stu 2019.

    I'm so glad that works on A7 now, spent half the night adding support for it

    Poništi
  9. proslijedio/la je Tweet
    10. stu 2019.

    Historical moment! Highest amount of ever recorded since the beginning of weather records! Truely phenomenal!

    Poništi
  10. 10. stu 2019.

    Finally rc 0.9 is out. This is such an amazing project, thanks to everyone putting so much time into it and I'm really thankful that I can be a part of this <3

    Poništi
  11. proslijedio/la je Tweet
    10. stu 2019.

    checkra1n beta 0.9 is now available at ! - this is an early release and as such you should not be running it on a primary release. please read the FAQ on the website for additional information. reddit:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    27. ruj 2019.

    And now you can debug your demoted iPhone over JTAG/SWD with the Bonobo Cable and OpenOCD ! !

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    27. ruj 2019.

    New episode today in under an hour at 10AM EST about the new BootROM exploit for A5-A11 devices! Featuring , , , and ! Same place as usual: !

    Poništi
  14. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  15. 8. kol 2019.

    Last week was super awesome; had so much fun (Thx and ) and I even found another upsi by apple: sha256(blackbird.txt) = ad360a459b3f89438c315f5767ecfda2fdfb92131d5922df4f73192f3079b453

    Poništi
  16. proslijedio/la je Tweet
    8. kol 2019.

    APRR: Of Apple hardware secrets. Might include a free 0day.

    Poništi
  17. proslijedio/la je Tweet
    27. lip 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    And you can throw in mitigations all you want, but look at the latest iPhone: years ahead of its competitors with KTRR, APRR, PPL, PAC, its VMSA lockdown - and yet, all it takes to break it are a few bored students.🙃

    Poništi
  18. 21. lip 2019.

    age++ :) what a year, hope the next one will be like this or even better

    Poništi
  19. 12. lip 2019.

    There are however about 100 different initWithTask methods and they added a lot of stuff between 2018 and now, so maybe there is acc a good code path. Also: the bug is still present in source but I checked 13b1 and they added checks there.

    Prikaži ovu nit
    Poništi
  20. 12. lip 2019.

    A funny bug because it was introduced in 2015 with "task_t considered harmful" bug reports after the 3rd revision of them trying to fix it, but it was useless because I was never able to find a good code path to get ::start or another method to fail consistently.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·