Tweetovi

Blokirali ste korisnika/cu @oldfresher

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @oldfresher

  1. proslijedio/la je Tweet
    28. sij
    Poništi
  2. proslijedio/la je Tweet
    28. sij

    The 360 Alpha team helped Apple to fix 0-click RCE & memory leak bugs in CoreBluetooth, which could allow attackers near by to remote control any Mac systems with zero interaction.

    Poništi
  3. proslijedio/la je Tweet
    10. sij

    Android: ashmem readonly bypasses via remap_file_pages() and ASHMEM_UNPIN

    Poništi
  4. proslijedio/la je Tweet

    We're excited to announce Vancouver 2020 with new categories and returning partners, & along with sponsor . More than $1,000,000 USD available - plus a Model 3! Details at

    Poništi
  5. proslijedio/la je Tweet
    Poništi
  6. proslijedio/la je Tweet
    13. pro 2019.

    ICYMI published guidance this week on how to sync the kernel to upstream LTS. Syncing to LTS is critical for Android device security. While it's only step 1, kudos to Android for taking a step in the right direction!

    Poništi
  7. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  8. proslijedio/la je Tweet
    11. pro 2019.
    Poništi
  9. proslijedio/la je Tweet
    12. pro 2019.

    This is a really great overview of modern fuzzing methodology. Thanks for sharing Jonathan!

    Poništi
  10. proslijedio/la je Tweet
    12. pro 2019.

    CVE-2019-13734, CVE-2019-13750, CVE-2019-13751, CVE-2019-13752, CVE-2019-13753 WebSQL, 3 of them were used on TFC(). 😂 Sorry due to responsible disclosure I didn't reply to some DMs a few days eariler about asking me what I used on TFC.

    Poništi
  11. proslijedio/la je Tweet
    4. pro 2019.

    iOS on QEMU. Super cool project: With Checkm8, and this, there's no real need for 'research devices'. The only thing left is to on PAC enabled prod devices and we're set.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    2. pro 2019.

    Android vulnerability Vulnerability allows malicious app to masquerade as any other app on the device. So, if you launch Facebook, malware is executed. See video demo how it works.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    30. stu 2019.
    Poništi
  14. 28. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    26. stu 2019.

    Xiaomi Mi6 WiFi Captive Portal Remote Code Execution (Pwn2Own 2018) [writeup] by

    Poništi
  16. proslijedio/la je Tweet
    25. stu 2019.

    New tricks necessary for debugging v8 with lldb recently: To map the source: (lldb) settings set target.source-map "../../" "/path/to/v8/dir" Somehow v8::internal::Object is now ambiguous, so: (lldb) p _v8_internal_Print_Object(*((void**)(v8_local.val_)))

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    23. stu 2019.
    Poništi
  18. proslijedio/la je Tweet

    New Research Note: “iBoot heap internals” This is a logical advancement of my previous Research Note: “iBoot address space” in which I explore Apple’s bootchain internals for the purposes of vulnerability research and exploit dev.

    Poništi
  19. 21. stu 2019.

    Yet another complete full-chain RCEs of pixel device found by me, I'll disclose the detail of the exploit at a proper time

    Poništi
  20. proslijedio/la je Tweet
    21. stu 2019.

    Project Zero blog: "Bad Binder: Android In-The-Wild Exploit" by Maddie Stone () - 

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·