Hao

@windknown

code a coder

China
Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @windknown

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @windknown

  1. proslijedio/la je Tweet
    4. svi 2019.

    .@[REDACTED] @[REDACTED] @[REDACTED] @[REDACTED] @[REDACTED] @[REDACTED] @[REDACTED] @[REDACTED] @[REDACTED] @[REDACTED] @[REDACTED]

    Poništi
  2. proslijedio/la je Tweet

    Really depressing to see Chinese companies like “xy” abusing/ripping the Pangu jailbreak… :(

    Poništi
  3. 16. lip 2014.

    Again, recommend 's iOS kernel training to people who want to learn iOS kernel exploit technique :)

    Poništi
  4. 8. lip 2014.

    Finally port to arm64 ~~ BTW, will you add more contents about arm64 in your next training?

    Poništi
  5. 30. svi 2014.
    Poništi
  6. proslijedio/la je Tweet
    Odgovor korisniku/ci
    Poništi
  7. proslijedio/la je Tweet
    7. lip 2013.
    Poništi
  8. proslijedio/la je Tweet
    7. ožu 2013.
    Poništi
  9. 19. velj 2013.

    iOS 6.1.2 didn't fix the evasi0n bug. Maybe Apple is auditing there kernel code to avoid passing object pointer to user space any more @@

    Poništi
  10. proslijedio/la je Tweet
    12. velj 2013.

    I've released a paper describes the full technique used in the recent Flash exploit (draft version, sorry no edit:P).

    Poništi
  11. 9. velj 2013.

    Happy Chinese new year !

    Poništi
  12. 7. velj 2013.

    Write a simple test case to prove the IOUSBDeviceInterfaceUserClient bug. It tested on my iPhone4 and iOS 5.1.1

    Poništi
  13. 6. velj 2013.

    So it's easy to exploit this bug for iOS5 because of no separation between user space and kernel. But for iOS6 is much harder...

    Poništi
  14. 6. velj 2013.

    Actually kernel will call function according to an object's vtable which could be controlled by us.

    Poništi
  15. 6. velj 2013.

    Seems selector 15 function of IOUSBDeviceInterfaceUserClient directly take the input scalar value as an object with only checking if it's 0

    Poništi
  16. proslijedio/la je Tweet
    29. pro 2012.

    Also, EMET (as usual) blocks new IE8 exploit with Mandatory ASLR, EAF, and EMET 3.5's ROP protection.

    Poništi
  17. proslijedio/la je Tweet
    28. pro 2012.
    Poništi
  18. proslijedio/la je Tweet
    16. pro 2012.

    Gotta see this pic. Seems like there's in Harbin, China.

    Poništi
  19. proslijedio/la je Tweet
    27. stu 2012.

    The iOS 6 presentation I did with at is available on youtube:

    Poništi
  20. proslijedio/la je Tweet
    10. lis 2012.

    All speakers of POC2012 are decided. 75% of topics are NEW ones! 7 speakers'll disclose 0days and 4 will show new base attack techniques.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·