Twitter | Pretraživanje | |
nedwill
Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow!
Reply Retweet Označi sa "sviđa mi se" More
tylerni7 10. pro
Odgovor korisniku/ci @NedWilliamson
Awesome writeup! Easy to read, great walk through of the process, super nice bug. A+++++ would read again
Reply Retweet Označi sa "sviđa mi se"
nedwill 11. pro
Odgovor korisniku/ci @tylerni7
Thanks Tyler!
Reply Retweet Označi sa "sviđa mi se"
SorryMybad 11. pro
Odgovor korisniku/ci @NedWilliamson @KeyZ3r0
!!!!!!!!!!!!!!!!!!!!!!!!!!1
Reply Retweet Označi sa "sviđa mi se"
Looben Yang 11. pro
Odgovor korisniku/ci @NedWilliamson
Rarely seen nice write-up which covers a lot of detail from discovery to exploitation!
Reply Retweet Označi sa "sviđa mi se"
Scott Knight 12. pro
Odgovor korisniku/ci @NedWilliamson
Amazing write up! I also strongly agree with your request in the conclusion. “Finally, if Apple made XNU sources available more often, ideally per-commit, I could have automated merging my fuzzer against the sources and we could have caught the iOS 12.4 regression immediately.”
Reply Retweet Označi sa "sviđa mi se"
matthew_mabe 3. sij
Odgovor korisniku/ci @NedWilliamson
Will there be a chimera jailbreak for iOS 12.4.1
Reply Retweet Označi sa "sviđa mi se"
kabal089 10. pro
Odgovor korisniku/ci @NedWilliamson
Awesome write up Ned, many thanks
Reply Retweet Označi sa "sviđa mi se"
Doge 11. pro
Odgovor korisniku/ci @NedWilliamson
Great video, I could actually semi follow it and not get completely lost by the end, which is a first for me. What I am wondering is how tf does a fuzzer work, and how is it able to find wonky stuff like this?
Reply Retweet Označi sa "sviđa mi se"