Tweetovi

Blokirali ste korisnika/cu @screw42848140

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @screw42848140

  1. proslijedio/la je Tweet
    29. sij

    Interesting vulnerability: may_create_in_sticky() was done when we already have dropped the ref to dir and thus dir (a struct dentry ptr) might be freed and reuse. One impact is a 1-bit infoleak oracle in open() (CVE-2020-8428)

    Poništi
  2. proslijedio/la je Tweet
    16. tra 2018.

    Guide to iOS estimated passcode cracking times (assumes random decimal passcode + an exploit that breaks SEP throttling): 4 digits: ~13min worst (~6.5avg) 6 digits: ~22.2hrs worst (~11.1avg) 8 digits: ~92.5days worst (~46avg) 10 digits: ~9259days worst (~4629avg)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    27. srp 2015.

    fuzzing UTF-8 strings pro-tip: Ⱥ (U+023A) and Ⱦ (U+023E) are the *only* code points to increase in length (2 to 3 bytes) when lowercased.

    Poništi
  4. proslijedio/la je Tweet
    7. sij

    First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group sample: download /xxxx.net/pages/1/file C2 mod, Github display it. /xxx.net/202/xxx report:

    Poništi
  5. proslijedio/la je Tweet
    28. pro 2019.

    2019 was the best year for jailbreaking yet: - PAC Bypass for iOS 12.0-12.1.2 - Reliable Kernel Exploits - Jailbreak for Latest Version (12.4) - KTRR Bypass for A11 - PAC-Less Jailbreak - [BootROM Exploit / Unpatchable Jailbreak] for A7-A11 - Untethered Code Execution for iOS 11

    Poništi
  6. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    26. pro 2019.

    Great stuff to recover symbols for all those embedded Linux kernels I wrote a script for this long ago but it became outdated and required unpacking the kernel first. This one looks much nicer and up-to-date (check the history write-up in the comments!)

    Poništi
  8. proslijedio/la je Tweet
    10. pro 2019.

    This is the long-awaited software-based fault attack alternative to Rowhammer on x86 computers. This time the fault is not produced in the memory cells, but directly in the processor core, bypassing all SGX protections.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    10. pro 2019.

    AOSP just got a web source tool with cross references and searches:

    Poništi
  10. proslijedio/la je Tweet
    4. stu 2019.

    Published a collection of all the Apple bootroms I got - both for AP (application processor) and SEP (Secure Enclave), including very rare ones dumped from early prototypes

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    So Apple did fix the icloud bypass in iOS 13.3 beta #4

    Poništi
  12. proslijedio/la je Tweet
    7. pro 2019.

    iPhone11,8 17C5053a sepi 9f974f1788e615700fec73006cc2e6b533b0c6c2b8cf653bdbd347bc1897bdd66b11815f036e94c951250c4dda916c00

    Poništi
  13. proslijedio/la je Tweet
    8. kol 2019.

    APRR: Of Apple hardware secrets. Might include a free 0day.

    Poništi
  14. proslijedio/la je Tweet
    9. pro 2019.

    unc0ver v3.8.0~b1 is NOW OUT - Now with iOS 12.4.1 support for A12 iPhones! Get it at: Reddit post:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    11. pro 2019.

    One unnoticed vulnerability found by Intel STORM team: Intel IGD (integarted graphic card) can read two first dwords (unencrypted of course) of cache lines belonging to Intel SGX Enclave

    Poništi
  16. proslijedio/la je Tweet
    11. pro 2019.

    If you are on A12-A13: - __Stay__ if you are already jailbroken - __Stay__ if you are on 13.2.3 or lower - __Downgrade__ to 13.2.3 if you are on 13.3 I will get on it as soon as a new kernel exploit is available. Be patient, do not update - Stay on the lowest version possible.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    6. pro 2019.

    Release - n1ghtshade. A downgrade/jailbreak tool for A6 -

    Poništi
  18. proslijedio/la je Tweet
    7. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    5. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    4. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·