Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @screw42848140
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @screw42848140
-
screw proslijedio/la je Tweet
Interesting vulnerability: may_create_in_sticky() was done when we already have dropped the ref to dir and thus dir (a struct dentry ptr) might be freed and reuse. One impact is a 1-bit infoleak oracle in open() (CVE-2020-8428) https://seclists.org/oss-sec/2020/q1/39?utm_source=dlvr.it …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
Guide to iOS estimated passcode cracking times (assumes random decimal passcode + an exploit that breaks SEP throttling): 4 digits: ~13min worst (~6.5avg) 6 digits: ~22.2hrs worst (~11.1avg) 8 digits: ~92.5days worst (~46avg) 10 digits: ~9259days worst (~4629avg)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
fuzzing UTF-8 strings pro-tip: Ⱥ (U+023A) and Ⱦ (U+023E) are the *only* code points to increase in length (2 to 3 bytes) when lowercased.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
#APT#sidewinder First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group sample: https://github.com/blackorbird/APT_REPORT/blob/master/sidewinder/ … download /xxxx.net/pages/1/file C2 mod, Github display it. /xxx.net/202/xxx report: https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/ …pic.twitter.com/ZwEc4a2zEH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
2019 was the best year for jailbreaking yet: - PAC Bypass for iOS 12.0-12.1.2 - Reliable Kernel Exploits - Jailbreak for Latest Version (12.4) - KTRR Bypass for A11 - PAC-Less Jailbreak - [BootROM Exploit / Unpatchable Jailbreak] for A7-A11 - Untethered Code Execution for iOS 11
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
New blogpost: Sanitized Emulation with QEMU-AddressSanitizer https://andreafioraldi.github.io/articles/2019/12/20/sanitized-emulation-with-qasan.html … I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
Great stuff to recover symbols for all those embedded Linux kernels https://redd.it/efxd0x I wrote a script for this long ago but it became outdated and required unpacking the kernel first. This one looks much nicer and up-to-date (check the history write-up in the comments!)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
This is the long-awaited software-based fault attack alternative to Rowhammer on x86 computers. This time the fault is not produced in the memory cells, but directly in the processor core, bypassing all SGX protections.pic.twitter.com/rFBRoZUDXY
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
AOSP just got a web source tool with cross references and searches:https://android-developers.googleblog.com/2019/12/code-search-with-cross-references-for-aosp.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
Published a collection of all the Apple bootroms I got - both for AP (application processor) and SEP (Secure Enclave), including very rare ones dumped from early prototypes http://securerom.fun pic.twitter.com/MFc7HShZtK
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
So Apple did fix the icloud bypass in iOS 13.3 beta #4
#icloudbypass#iCloudBypassCA#checkra1n#checkm8#iphone#iphone7pic.twitter.com/CX461NWqRHHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
iPhone11,8 17C5053a sepi 9f974f1788e615700fec73006cc2e6b533b0c6c2b8cf653bdbd347bc1897bdd66b11815f036e94c951250c4dda916c00
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
APRR: Of Apple hardware secrets. https://siguza.github.io/APRR/ Might include a free 0day.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
unc0ver v3.8.0~b1 is NOW OUT - Now with iOS 12.4.1 support for A12 iPhones! Get it at: https://unc0ver.dev Reddit post:https://www.reddit.com/r/jailbreak/comments/e8epwa/news_unc0ver_v380b1_is_now_out_now_with_ios_1241/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
One unnoticed vulnerability found by Intel STORM team: Intel IGD (integarted graphic card) can read two first dwords (unencrypted of course) of cache lines belonging to Intel SGX Enclavehttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
If you are on A12-A13: - __Stay__ if you are already jailbroken - __Stay__ if you are on 13.2.3 or lower - __Downgrade__ to 13.2.3 if you are on 13.3 I will get on it as soon as a new kernel exploit is available. Be patient, do not update - Stay on the lowest version possible.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
Release - n1ghtshade. A downgrade/jailbreak tool for A6 -https://github.com/synackuk/n1ghtshade/releases …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
screw proslijedio/la je Tweet
Thinking Outside the JIT Compiler: Understanding and Bypassing StructureID Randomization with Generic and Old-School Methods
#MobileSecurity#iOSsecurity#BHEU2019 [SLIDES] by@ThomasKing2014 https://i.blackhat.com/eu-19/Thursday/eu-19-Wang-Thinking-Outside-The-JIT-Compiler-Understanding-And-Bypassing-StructureID-Randomization-With-Generic-And-Old-School-Methods.pdf …pic.twitter.com/SdR6uV6ezn
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
screw proslijedio/la je Tweet
Booting the iOS Kernel to an Interactive Bash Shell on QEMU
#MobileSecurity#iOSsecurity#BHEU2019 by@alephsecurity and@JonathanAfek SLIDES: https://i.blackhat.com/eu-19/Wednesday/eu-19-Afek-Booting-The-iOS-Kernel-To-An-Interactive-Bash-Shell-On-QEMU.pdf … Whitepaper: https://i.blackhat.com/eu-19/Wednesday/eu-19-Afek-Booting-The-iOS-Kernel-To-An-Interactive-Bash-Shell-On-QEMU-wp.pdf …pic.twitter.com/XY3xT1CGcx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.