Twitter | Pretraživanje | |
Aleph Research
Exploiting Qualcomm EDL Programmers: Memory & Storage based attacks allowing PBL extraction, rooting, secure boot bypassing & bootloader chain debugging/tracing. Multiple Qualcomm based mobile devices affected (5-part blog post)
Research & Exploitation of Qualcomm EDL Firehose Programmers: From PBL (Boot ROM) Extraction, Research & Analysis to Secure Boot Bypass in Nokia 6. (Part 1)
Aleph Research Aleph Research @alephsecurity
Reply Retweet Označi sa "sviđa mi se" More
Dylanger Daly 22. sij 2018.
Odgovor korisniku/ci @alephsecurity
This still requires the OEM's Signed Firehose to be leaked, on top of this, some newer versions of Firehose will not allow peek/poke if Secure Boot is Enabled.
Reply Retweet Označi sa "sviđa mi se"
the grugq 22. sij 2018.
Odgovor korisniku/ci @_jsoo_ @alephsecurity
I don't think its that useful...
Reply Retweet Označi sa "sviđa mi se"
the grugq 26. sij 2018.
Odgovor korisniku/ci @kapitanpetko @alephsecurity
I guess, from old data here, is that they added a special hack for FBI access which was the problem.
Reply Retweet Označi sa "sviđa mi se"
Von oben nach unten 31. sij 2018.
Odgovor korisniku/ci @alephsecurity @kapitanpetko
For years, the unlocks mobile boxes have been using this technique to Unbrick phones..and more. Not new.
Reply Retweet Označi sa "sviđa mi se"