|
b0untea
@
b0untea
|
|
Android security researcher, engineer.
|
|
|
278
Tweetovi
|
144
Pratim
|
115
Osobe koje vas prate
|
| Tweetovi |
| b0untea proslijedio/la je tweet | ||
|
Andrea Barisani
@AndreaBarisani
|
12. pro |
|
My @PacSecjp slides on Insecure Boot are now available here:
github.com/abarisani/abar…
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Eduardo Novella
@enovella_
|
9. pro |
|
TEE Exploitation by Example: Exploiting Trusted Apps in @Samsung’s TEE - Eloi Sanfelix (@esanfelix ) - INFILTRATE 2019 @InfiltrateCon. Video: vimeo.com/335947683
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Maddie Stone
@maddiestone
|
21. stu |
|
Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.
googleprojectzero.blogspot.com/2019/11/bad-bi…
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
20. stu |
|
KNOX Kernel Mitigation Bypasses - New Reliable Android Kernel Root Exploitation Part #2
#MobileSecurity #AndroidSecurity
#POC2019 [SLIDES]
powerofcommunity.net/poc2019/x82.pdf pic.twitter.com/mLnykwWM6b
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
LimitedResults
@LimitedResults
|
13. stu |
|
Last and FATAL HW exploit on ESP32.
Using this, an attacker is now able to decrypt the firmware and install its own (encrypted) malware PERSISTENTLY.
No Fix on current ESP32 , vuln is here forever 😮
Enjoy:
limitedresults.com/2019/11/pwn-th…
#FatalFuryonESP32 #ESP32 #EspressifSystems pic.twitter.com/wkZm8aGF3l
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
flanker017
@flanker_hqd
|
6. stu |
|
blog.flanker017.me/text-to-speech… Text-To-Speech speaks pwned: writeup for CVE-2019-16253, how a benign TTS language pack lead to system shell.
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
quarkslab
@quarkslab
|
24. lis |
|
[BLOG] Analysis of Qualcomm Secure Boot Chains blog.quarkslab.com/analysis-of-qu… Nice work by Elouan during his internship: congrats :)
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Maddie Stone
@maddiestone
|
4. lis |
|
Kernel privilege escalation bug in Android affecting fully patched Pixel 2 & others. Reported under 7 day deadline due to evidence of in-the-wild exploit. @tehjh and I quickly wrote a POC to get arbitrary kernel r/w using this bug, released in tracker. bugs.chromium.org/p/project-zero…
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Nicolas Krassas
@Dinosn
|
2. lis |
|
How a double-free bug in WhatsApp turns to RCE
awakened1712.github.io/hacking/hackin…
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
1. ruj |
|
Launching feedback-driven fuzzing on TrustZone TEE
#MobileSecurity #AndroidSecurity
#HITBGSEC2019 [SLIDES] by @e13fter
gsec.hitb.org/materials/sg20… pic.twitter.com/3FlXpFrBr2
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
LimitedResults
@LimitedResults
|
1. ruj |
|
The Disclosure about Esp32 security continues.
This time, it's a secure boot bypass using voltage glitching:
limitedresults.com/2019/09/pwn-th…
No way to fix it except hardware revision🥶.
Stay tuned for the final act.
#Esp32 #EspressifSystems pic.twitter.com/1SQHZIAlHG
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Ian Beer
@i41nbeer
|
30. kol |
|
googleprojectzero.blogspot.com/2019/08/a-very… thanks to @_clem1, @5aelo for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
12. kol |
|
Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone
#MobileSecurity #AndroidSecurity
#BHUSA2019 by @GXiling
SLIDES: i.blackhat.com/USA-19/Wednesd…
PAPER: i.blackhat.com/USA-19/Wednesd… pic.twitter.com/LwgHA1B2zg
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
GongXiling
@GXiling
|
13. kol |
|
Update the Slides: The vulnerability that allows arbitrary read/write Linux Kernel memory from Modem is CVE-2019-10538, which already fixed in the August Android Security Bulletin twitter.com/mobilesecurity…
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
12. kol |
|
Breaking Samsung's ARM TrustZone
#MobileSecurity #AndroidSecurity
#BHUSA2019 [SLIDES] by @quarkslab
(@pandasec_ @NeatMonster_ @patateQbool)
i.blackhat.com/USA-19/Thursda… pic.twitter.com/H3oHhk67T9
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Gynvael Coldwind
@gynvael
|
10. kol |
|
Paged Out! #1 is out! (and it's free to download!)
pagedout.institute/?page=issues.p…
There are 57 articles in 12 categories:
Electronics
Programming
Assembly
Reverse Engineering
Sec/Hack
Retro
File Formats
Algorithmics
SysAdmin
Radio
Phreaking
OS Internals
Enjoy! #PagedOut!
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
flanker017
@flanker_hqd
|
6. kol |
|
Hello everyone, long time no see! Now begins a series of blog posts about bugs I found and reported of various Android vendors. This very first one is about the exploit chain we used to get remote arbitrary application install on Galaxy S8. Plz enjoy: blog.flanker017.me/galaxy-leapfro…
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Blue Frost Security
@bluefrostsec
|
8. kol |
|
Stuck in the sandbox? We've got your back! Deep dive analysis and full exploit of a Chrome IndexedDB race condition by @DimitriFourny and @moritzj: labs.bluefrostsecurity.de/blog/2019/08/0…
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Andy Nguyen
@theflow0
|
18. lip |
|
I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities! theofficialflow.github.io/2019/06/18/tri… pic.twitter.com/1DXu4UvlmT
|
||
|
|
||
| b0untea proslijedio/la je tweet | ||
|
Byoungyoung Lee
@mylifeasageek
|
27. svi |
|
Any guess how to find races through fuzzing? Here's our approach, Razzer (github.com/compsec-snu/ra…), which found 16 new race bugs in the Linux kernel
|
||
|
|
||