Yanick Fratantonio  

@reyammer

Prof . DEFCON CTF Org. Android security researcher. MOBISEC class: Shellphish/NOPS hacker. 100% Italian.🍕

Vrijeme pridruživanja: rujan 2010.

Tweetovi

Blokirali ste korisnika/cu @reyammer

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @reyammer

  1. Prikvačeni tweet

    [RELEASE] 📢: all the Android security MOBISEC challs + app analysis system are now public! These challs push you to write actual Android apps to get flags / exploit vulnerable apps on the same device. It's a first of a kind :) Give it a try at !

    Prikaži ovu nit
    Poništi
  2. 15. sij
    Poništi
  3. proslijedio/la je Tweet
    12. pro 2019.

    Police raid in Moscow office. Several employees, including chief developer and co-owner Igor Sysoev, have been arrested. ♻ schors С Днем Конституции РФ всех. Несмотря на то, что автор снес...

    Poništi
  4. Poništi
  5. If you are in Android RE or want to start with it, check this amazing resource!

    Poništi
  6. proslijedio/la je Tweet
    4. pro 2019.

    We compiled a long list of Threats to Validity/Relevance in Security Research for our students, building on common sense & our papers on malware experiments and on benchmarking (and inspired by 's excellent blog). Perhaps useful for others?

    Poništi
  7. Today I opened `ldd` and I found out it's just a bash script... and when passing args, you can just use their prefix... I've never seen anything like this in my entire life

    Poništi
  8. proslijedio/la je Tweet

    We recently won the Embedded Security Challenge 2019, using our latest research on firmware re-hosting! Our USENIX paper (with Purdue ) is now available:

    Poništi
  9. Here is yet another variant of Android UI task hijacking attack. Very interesting to see these tricks used in the wild, but not very surprising: the safer Android gets from low-level attacks, the more bad guys need to trick users via UI, which still has fundamental problems

    Poništi
  10. proslijedio/la je Tweet
    2. pro 2019.

    Is there any public list/repository/whatever in which the instructions for different archs are semantically divided into categories? Something like: intel_64_arithmetic = ["add", "sub", ...] intel_64_stack = ["pop", "push", ...]

    Poništi
  11. Poništi
  12. proslijedio/la je Tweet

    [THREAD] and directive require for tracking. EU websites rely on IAB banner providers to implement consent, but what happens behind the cookie banner interface? Our study finds 54% of them are non-compliant. (1/11)

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    23. stu 2019.

    TIL that you can "/dev/stdin" $ cat in "Hello, world!" $ cat a.cpp <stdio.h> int main() { printf("%s\n", "/dev/stdin" ); return 0; } $ g++ a.cpp < in && ./a.out Hello, world!

    Poništi
  14. proslijedio/la je Tweet
    24. stu 2019.

    I am looking for PhDs and PostDocs to join my research group at ! Topics: System Security, Binary Analysis, Firmware Analysis, IoT, Embedded Systems, Mobile Security, Authentication, Trustzone If you are interested, feel free to contact me: antoniob@purdue.edu

    Poništi
  15. proslijedio/la je Tweet
    21. stu 2019.

    The remaining qualifying events for 28 have been chosen! Winners of , HITCON, , , , DC China's BCTF, and top N from our quals will be invited! Philosophy, dates, and details here: . See you in Vegas!

    Poništi
  16. proslijedio/la je Tweet
    21. stu 2019.

    Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

    Poništi
  17. Back from Huawei Bug Bounty Munich trip, what a fantastic event. Humbled by the skills and knowledge of these folks, and super happy I finally got to meet many twitter-only friends in real life. Respect!

    Poništi
  18. Hey twitter peeps, I'm in Munich for a couple of days for Huawei Bug Bounty program, ping me if you are around and want to meet 👋

    Poništi
  19. This is likely a 'benign' bug... but why on earth would FB have code that touches the camera API when dealing with showing feeds? Cameras don't turn on by themselves. I find the mere existence of this code, buggy or not, deeply disturbing.

    Poništi
  20. Holy shit, this deserves an English translation. Hold yourself... Password policy from a *BANK*: "insert your password in Google, if it returns less than 10 results it's a good password". Hey consortium, we need a megastrafacepalm emoji asap

    Poništi
  21. Tweet je nedostupan.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·