Twitter | Pretraživanje | |
b0untea
Android security researcher, engineer.
278
Tweetovi
144
Pratim
115
Osobe koje vas prate
Tweetovi
b0untea proslijedio/la je tweet
Andrea Barisani 12. pro
My slides on Insecure Boot are now available here:
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Eduardo Novella 9. pro
TEE Exploitation by Example: Exploiting Trusted Apps in ’s TEE - Eloi Sanfelix ( ) - INFILTRATE 2019 . Video:
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Maddie Stone 21. stu
Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Mobile Security 20. stu
KNOX Kernel Mitigation Bypasses - New Reliable Android Kernel Root Exploitation Part #2 [SLIDES]
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
LimitedResults 13. stu
Last and FATAL HW exploit on ESP32. Using this, an attacker is now able to decrypt the firmware and install its own (encrypted) malware PERSISTENTLY. No Fix on current ESP32 , vuln is here forever 😮 Enjoy:
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
flanker017 6. stu
Text-To-Speech speaks pwned: writeup for CVE-2019-16253, how a benign TTS language pack lead to system shell.
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
quarkslab 24. lis
[BLOG] Analysis of Qualcomm Secure Boot Chains Nice work by Elouan during his internship: congrats :)
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Maddie Stone 4. lis
Kernel privilege escalation bug in Android affecting fully patched Pixel 2 & others. Reported under 7 day deadline due to evidence of in-the-wild exploit. and I quickly wrote a POC to get arbitrary kernel r/w using this bug, released in tracker.
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Nicolas Krassas 2. lis
How a double-free bug in WhatsApp turns to RCE
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Mobile Security 1. ruj
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
LimitedResults 1. ruj
The Disclosure about Esp32 security continues. This time, it's a secure boot bypass using voltage glitching: No way to fix it except hardware revision🥶. Stay tuned for the final act.
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Ian Beer 30. kol
thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Mobile Security 12. kol
Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone by SLIDES: PAPER:
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
GongXiling 13. kol
Update the Slides: The vulnerability that allows arbitrary read/write Linux Kernel memory from Modem is CVE-2019-10538, which already fixed in the August Android Security Bulletin
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Mobile Security 12. kol
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Gynvael Coldwind 10. kol
Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
flanker017 6. kol
Hello everyone, long time no see! Now begins a series of blog posts about bugs I found and reported of various Android vendors. This very first one is about the exploit chain we used to get remote arbitrary application install on Galaxy S8. Plz enjoy:
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Blue Frost Security 8. kol
Stuck in the sandbox? We've got your back! Deep dive analysis and full exploit of a Chrome IndexedDB race condition by and :
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Andy Nguyen 18. lip
I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities!
Reply Retweet Označi sa "sviđa mi se"
b0untea proslijedio/la je tweet
Byoungyoung Lee 27. svi
Any guess how to find races through fuzzing? Here's our approach, Razzer (), which found 16 new race bugs in the Linux kernel
Reply Retweet Označi sa "sviđa mi se"