|
Proteas
@
ProteasWang
Zone 3
|
|
Security Researcher at Qihoo 360 Nirvan Team
|
|
|
1.093
Tweetovi
|
263
Pratim
|
3.907
Osobe koje vas prate
|
| Tweetovi |
|
Proteas
@ProteasWang
|
19. sij |
|
:)
|
||
|
|
||
|
Proteas
@ProteasWang
|
19. sij |
|
d00139ed4f1422410fad056e83f05b418046d5b8dde5806410c0e2385d89a8e6 :)
|
||
|
|
||
|
Proteas
@ProteasWang
|
14. sij |
|
FWD: The AArch64 backend gained definitions for missing Apple CPU names. reviews.llvm.org/rG903e5c3028d pic.twitter.com/1n2cCNczhQ
|
||
|
|
||
|
Proteas
@ProteasWang
|
22. pro |
|
不管是否愿意,每一代人都有自己的历史使命或者历史局限性。
|
||
|
|
||
|
Proteas
@ProteasWang
|
19. pro |
|
seems that Gigalocker is kind of filesystem integrity protection mechanism.
|
||
|
|
||
|
Proteas
@ProteasWang
|
17. pro |
|
updated :)
|
||
|
|
||
|
Proteas
@ProteasWang
|
10. pro |
|
#idatips how to disable arm macro instruction? Options>General…>Analysis>Kernel option3>Enable macro, uncheck it.
|
||
|
|
||
| Proteas proslijedio/la je tweet | ||
|
qwertyoruiop
@qwertyoruiopz
|
8. stu |
|
|
||
|
Proteas
@ProteasWang
|
30. lis |
|
Binary Format of iOS 13 Sandbox Profile Collection: github.com/Proteas/ios13-…
|
||
|
|
||
|
Proteas
@ProteasWang
|
29. lis |
|
Reported some iOS kernel bugs to product-security[AT]apple[DOT]com 2 hours ago, but didn’t received any auto-reply. so where are my bugs...
|
||
|
|
||
| Proteas proslijedio/la je tweet | ||
|
Brandon Azad
@_bazad
|
28. lis |
|
KTRW was motivated by the desire to see better and more open tooling for security research on iPhones. Read about the journey to find the KTRR bypass: googleprojectzero.blogspot.com/2019/10/ktrw-j…
|
||
|
|
||
|
Proteas
@ProteasWang
|
23. lis |
|
super good twitter.com/platformsec/st…
|
||
|
|
||
|
Proteas
@ProteasWang
|
29. ruj |
|
希望苹果的安全人员能明白:并不是说把内裤穿到外面,你们就是安全领域的超人。你们应该对社区保持尊重,并依赖社区的力量把安全做好。 twitter.com/axi0mX/status/…
|
||
|
|
||
| Proteas proslijedio/la je tweet | ||
|
axi0mX 🌧️📲
@axi0mX
|
27. ruj |
|
EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices.
Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).
github.com/axi0mX/ipwndfu
|
||
|
|
||
|
Proteas
@ProteasWang
|
26. ruj |
|
iOS 13.1, maild is in sandbox now. maybe something happened.
|
||
|
|
||
|
Proteas
@ProteasWang
|
12. ruj |
|
14G60, AppleSEPOS-438.60.1
17A5837a, AppleSEPOS-1267.0.12
|
||
|
|
||
|
Proteas
@ProteasWang
|
11. ruj |
|
17A577, com.apple.WebKit.WebContent: (allow syscall-unix (syscall-mask 531)).
|
||
|
|
||
|
Proteas
@ProteasWang
|
3. ruj |
|
|
||
| Proteas proslijedio/la je tweet | ||
|
Ian Beer
@i41nbeer
|
30. kol |
|
googleprojectzero.blogspot.com/2019/08/a-very… thanks to @_clem1, @5aelo for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
|
||
|
|
||
|
Proteas
@ProteasWang
|
29. kol |
|
Coverage Guided Code Auditing on XNU, xnu auditing method/trick. pic.twitter.com/69V2ricK51
|
||
|
|
||