|
sferrini
@
Simone_Ferrini
0xfffffff041414141
|
|
Security Researcher.
Interested in RE, hardware and low-level binary stuff.
Occasional CTF player (pwn only)
|
|
|
1.417
Tweetovi
|
425
Pratim
|
3.499
Osobe koje vas prate
|
| Tweetovi |
|
sferrini
@Simone_Ferrini
|
1. velj |
|
Challenge accepted: I’m switching off all my electronic devices for the next two weeks of vacation. Let’s see how long I can resist being completely offline 😅
|
||
|
|
||
|
sferrini
@Simone_Ferrini
|
23. sij |
|
They are called "global cross-references" and are implemented in IDA 7.4: hex-rays.com/products/ida/7… it’s a pretty cool feature :)
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
0x41con
@0x41con
|
21. sij |
|
0x41con 3rd [time is a charm] edition: 1-2 May 2020, Thessaloniki, Greece /cc @_argp
|
||
|
|
||
|
sferrini
@Simone_Ferrini
|
19. sij |
|
Just adding "-s" to the QEMU cmd is enough to debug it, and it works pretty well.
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
Siguza
@s1guza
|
7. sij |
|
New blog post. ARM hardware bug. In the specification.
siguza.github.io/PAN/
|
||
|
|
||
|
sferrini
@Simone_Ferrini
|
26. pro |
|
No CCC for me this year, have fun guys! And I’ll see ya all at next @0x41con :P
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
qwertyoruiop
@qwertyoruiopz
|
25. pro |
|
Merry Christmas! May many 0days show up under your Xmas tree.
|
||
|
|
||
|
sferrini
@Simone_Ferrini
|
21. pro |
|
What if you fix that code just placing a valid pointer there (reorganizing the struct)? So the free() succeeds!
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
David Smith
@Catfish_Man
|
21. pro |
|
(How does that even happen? Well, one of these types stores its capacity at the offset where the other one stores its buffer pointer 😭)
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
Project Zero Bugs
@ProjectZeroBugs
|
10. pro |
|
SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4 googleprojectzero.blogspot.com/2019/12/sockpu…
|
||
|
|
||
|
sferrini
@Simone_Ferrini
|
3. pro |
|
|
||
| sferrini proslijedio/la je tweet | ||
|
Ivan Krstić
@radian
|
22. stu |
|
Mac secure boot (with two world firsts: DMA defense from PCIe Bus 0, and the Option ROM sandbox), iOS kernel integrity, Pointer Auth Codes (PAC), APRR register, Page Protection Layer (PPL), and novel Find My crypto — all in my slides from Black Hat 2019! i.blackhat.com/USA-19/Thursda…
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
Brandon Azad
@_bazad
|
19. stu |
|
I'm presenting on KTRW at #36C3 this year. I'll take you along my journey discovering hardware debugging registers and discuss the challenges of writing a full-featured iOS kernel debugger usable with LLDB: halfnarp.events.ccc.de
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
checkra1n
@checkra1n
|
10. stu |
|
checkra1n beta 0.9 is now available at checkra.in! - this is an early release and as such you should not be running it on a primary release. please read the FAQ on the website for additional information. reddit: reddit.com/r/jailbreak/co…
|
||
|
|
||
|
sferrini
@Simone_Ferrini
|
31. lis |
|
Just donated to #TeamTrees, if you can, donate too. teamtrees.org
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
qwertyoruiop
@qwertyoruiopz
|
31. lis |
|
|
||
| sferrini proslijedio/la je tweet | ||
|
Brandon Azad
@_bazad
|
28. lis |
|
KTRW was motivated by the desire to see better and more open tooling for security research on iPhones. Read about the journey to find the KTRR bypass: googleprojectzero.blogspot.com/2019/10/ktrw-j…
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
Brandon Azad
@_bazad
|
28. lis |
|
I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB: github.com/googleprojectz…
|
||
|
|
||
| sferrini proslijedio/la je tweet | ||
|
checkra1n
@checkra1n
|
27. lis |
|
|
||
| sferrini proslijedio/la je tweet | ||
|
Samuel Groß
@5aelo
|
27. lis |
|
Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: gist.github.com/saelo/dd598a91… It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)
|
||
|
|
||