Twitter | Pretraživanje | |
Aleph Research 22. sij 2018.
Exploiting Qualcomm EDL Programmers: Memory & Storage based attacks allowing PBL extraction, rooting, secure boot bypassing & bootloader chain debugging/tracing. Multiple Qualcomm based mobile devices affected (5-part blog post)
Reply Retweet Označi sa "sviđa mi se"
Dylanger Daly
This still requires the OEM's Signed Firehose to be leaked, on top of this, some newer versions of Firehose will not allow peek/poke if Secure Boot is Enabled.
Reply Retweet Označi sa "sviđa mi se" More