Somebody with iOS exploit development skills could probably turn this WebKit regex vulnerability into something pretty powerful.pic.twitter.com/Z30Joqrqov
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
I typed the hex as to where to write the shellcode to. Unlike on MacOS, in my testing iOS isn't getting a pointer to exactly where the shellcode needs to copy to. And the offset isn't consistent. So I just wanted to see if I could write arbitrary data to an arbitrary address.
Not following. But I guess someone motivated could take the call stack and reproduce ;)
Just look in the .JS exploit file. It should make sense. It's pretty human-readable.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.