Tweets from August 2013

@tr1ana genial, me alegro pues! cualquier cosilla ya sabes :)

11:37pm August 31st 2013 via Falcon Pro in reply to tr1ana

@trufae configure your client to don't download attachments by default... its worst when someone sends a word document with an screenshot.

5:41pm August 31st 2013 via Falcon Pro in reply to trufae

RT @ChainfireXDA: SuperSU has been updated to v1.55 - http://t.co/6eP6ZeslUg

5:32pm August 31st 2013 via Falcon Pro

@CliffsEsport the / filesystem runs on ramdisk: boot.img contains a kernel and the ramdisk for the root filesystem.

3:37pm August 31st 2013 via Falcon Pro in reply to CliffsEsport

@Marccoga a veure si ho fem coincidir bé :)

11:47am August 31st 2013 via Falcon Pro in reply to Marccoga

Android unique device identifiers, serial number and ANDROID_ID - http://t.co/X91LbfwCs5

10:41am August 31st 2013 via web

Linux Boot sequence on ARM CPU -http://t.co/WcJQy8SAdu

10:41am August 31st 2013 via web

Unpack/repack boot.img/ramdisk for Android - http://t.co/DMtcrPO9kn

10:40am August 31st 2013 via web

Android ext4 system.img unpack repack - http://t.co/yX9Ho5wMBq

10:40am August 31st 2013 via web

Android root and insecure adb boot image explained - http://t.co/lD94r9cNmy

10:40am August 31st 2013 via web

unsecurebootimg.pl: unpack boot image, change insecure adb settings and pack it again - http://t.co/i2AUdv2ZIb

10:40am August 31st 2013 via web

RT @codepo8: Go to the Google play store and hit search without actually entering anything in the search box.

9:22am August 31st 2013 via Falcon Pro

RT @castellsrac1: Els @Verds descarreguen el 4d9net, sense folre en 3a ronda #castellers #castellsrac1 #stfelix http://t.co/tjCRUqZ06w

10:35pm August 30th 2013 via Falcon Pro

RT @castellsrac1: Els @Verds fan història! Descarreguen el 3d10fm!!!! Espectacular!!!! #castellsrac1 #castellers #stfelix http://t.co/kDoItcVEKz

10:35pm August 30th 2013 via Falcon Pro

RT @collinrm: Mobile Secuirty Update for September http://t.co/OK80dE5qdq

7:16pm August 30th 2013 via Falcon Pro

RT @pepeluxx: Spoofing WiFi AP based geolocation » good read http://t.co/AfDgDxeZmc

3:53pm August 30th 2013 via Falcon Pro

@cryptax according to Google translate it means 'seagull'

3:44pm August 30th 2013 via Falcon Pro in reply to cryptax

RT @mikko: Gamma claims FinSpy Mobile can infect Windows Phone devices. That would be 1st malware for WP. http://t.co/LLV9JdkV4h http://t.co/WtwaxMJtfq

3:37pm August 30th 2013 via Falcon Pro

RT @saschasegan: Xiaomi: Harder To Pronounce Than Huawei

1:54pm August 30th 2013 via Falcon Pro

RT @cryptax: Nice video of AndroRAT in action: http://t.co/CM6V6FYKPY :) (+ love the super C) #Android

11:32am August 30th 2013 via web

@odexcide sorry I haven't used ded or dare much, can't really compare. @TeamAndIRC

8:20pm August 29th 2013 via Falcon Pro in reply to odexcide

@jbarrio yo lo hago con location (net) y no noto que consuma tanto :/

8:16pm August 29th 2013 via Falcon Pro in reply to jbarrio

Curious to see @skier_t talk announced here :) http://t.co/6L5ymeWTpj

4:17pm August 29th 2013 via web

I've published dexinfo, a rudimentary Android DEX file parser written in C - https://t.co/9bdP4NPIit

10:20am August 29th 2013 via web

RT @AndroidPolice: Report: Hugo Barra, VP Of Android Product Management At Google, Is Leaving For Chinese Manufacturer Xiaomi http://t.co/vfvZgD4A36

4:10am August 29th 2013 via Falcon Pro

RT @Jhaddix: Want to break some Android apps? A list of all Android Crackme's and Vulnerable test Apps: http://t.co/Szl8FgW8BR

4:06am August 29th 2013 via Falcon Pro

RT @tkHWANG: An In-Depth Introduction to the Android Permission Model [pdf] http://t.co/Wg0nOWY1Mc by Jeff Six

3:41am August 29th 2013 via web

I've updated RootAdb, it should work properly on Android 4.3 now - https://t.co/Isb1qn64AB

3:09am August 29th 2013 via web

RT @Jhaddix: Adventures in ARM Shellcode - http://t.co/lPhaCHlEGs

9:58pm August 28th 2013 via Falcon Pro

RT @NicolasFalliere: Defeating reflection+encryption in Android Trojan Obad, using JEB 1.4 AST manipulation API, at http://t.co/I7gdNjqZ0G #jeb #decompiler

9:50pm August 28th 2013 via Falcon Pro

@minWi i bought it on best buy while I was there.

10:22am August 28th 2013 via Falcon Pro in reply to minWi

Dear @googlenexus, $229 != 229€. Glad I bought my new Nexus 7 in USA.

10:07am August 28th 2013 via web

RT @GooglePlay: We've lowered the price of #Nexus4. Get it for 25% off or more in Australia, Canada, Germany, Spain, Korea, US, UK: http://t.co/g8vIKtBC9N

6:49am August 28th 2013 via Falcon Pro

RT @mikko: Who Wrote the Pincer Android Trojan? http://t.co/hULg7w3VKP /by @briankrebs

5:44am August 28th 2013 via Falcon Pro

@quetzal si :) jo no estaré operatiu fins a la segona quinzena de setembre

8:29pm August 27th 2013 via Falcon Pro in reply to quetzal

@TeamAndIRC about to enjoy Olympic Cellars wine, thanks man! http://t.co/JAOyJmSNCg

7:30pm August 27th 2013 via Falcon Pro

Another handy service to send free SMS worldwide - http://t.co/ZrhtjTNJ7n

9:18am August 27th 2013 via Tweet Button

Handy service to receive SMS online (like mailinator for phones): http://t.co/A8tGA1Rtd6 http://t.co/ZLUjEpsWV4 http://t.co/kPDiKPOEMh

9:13am August 27th 2013 via web

RT @skier_t: Official Darm website has been released! http://t.co/yM7M5TfmIU (3-BSD licensed ARMv7 Disassembler in C with Python/Ruby bindings.)

9:29pm August 26th 2013 via Falcon Pro

@TeamAndIRC @PaulOBrien same here, i think it's worth, will save a lot of manual analysis time depending on the project.

8:39pm August 26th 2013 via Falcon Pro in reply to TeamAndIRC

RT @reyammer: "$ baksmali -D app.dump app.apk" returns a full (tex) dump of a dex. Too bad is not documented, that's really useful!

6:30pm August 26th 2013 via Falcon Pro

RT @AndroidPolice: Koush Explains: Chromecast Software Update Intentionally Disables Third-Party Streaming, Google Wants To Control... http://t.co/xz7hjt5rAF

2:38pm August 26th 2013 via Falcon Pro

@ChainfireXDA @supercurio haven't tried survival mode in supersu, but the +i on install-recovery.sh breaks OTA updater-script and OTA fails

12:36am August 26th 2013 via web in reply to ChainfireXDA

OTA Root Keeper script for Android 4.3+ https://t.co/mFw6I3BTb7 /cc @supercurio @ChainfireXDA @koush

12:28am August 26th 2013 via web

RT @gtvhacker: Check out our presentation on Hacking the second generation of #GoogleTV devices (plus a cameo by the #Chromecast) at http://t.co/GTQFykWtLb

1:24am August 25th 2013 via Falcon Pro

RT @thegrugq: Research showing that w/ 4 proximate locations of a cellphone, it is possible to identify an individual w/ 95% acc. http://t.co/2YwCDjkzvq

1:08am August 25th 2013 via Falcon Pro

RT @radareorg: How to change MAC address of the wireless interface of Nexus4 using r2. https://t.co/zgx43A3iiq /by @pof

12:58am August 25th 2013 via Falcon Pro

@jr_raphael add mistake #4: no worldwide launch.

4:06am August 24th 2013 via Falcon Pro in reply to jr_raphael

@_alec_ use 'adb reboot bootloader' first to put the phone in fastboot mode. bootloader must be unlocked to boot a custom kernel/recovery.

3:38am August 24th 2013 via Falcon Pro in reply to _alec_

RT @FredericJacobs: Best explanation of the Diffie-Hellman Key Exchange Ever. https://t.co/t8Jp9Focnx

5:40pm August 23rd 2013 via Falcon Pro

@NuShrike any Nexus, no idea about CF-autoroot, never used that.

10:19am August 23rd 2013 via Falcon Pro in reply to NuShrike

@thegrugq yes it should work for that, you can try it with a kernel 'known to work' first (ie: franco kernel from xda).

9:16am August 23rd 2013 via Falcon Pro in reply to thegrugq

@thegrugq it "works" but shows a black screen (but if you do adb shell, the recovery is booted & working). Happens since 4.3, no idea why

8:23am August 23rd 2013 via web in reply to thegrugq

'fastboot boot' is broken on Nexus4 bootloader MAKOZ20i, use this command instead: fastboot -c "lge.kcal=0|0|0|x" boot recovery.img

8:18am August 23rd 2013 via web

if you use #SuperSU, remount system rw & chattr -i /system/etc/install-recovery.sh before applying the new 4.3 OTA, otherwise it will fail.

7:37am August 23rd 2013 via web

RT @Zenofex: Well there goes that upcoming Chromecast bootloader exploit. You win this round google. #GTVHacker https://t.co/dQ3kNIU4E9

12:10am August 23rd 2013 via Falcon Pro

RT @NicolasFalliere: Decrypting strings of a decompiled Java class using JEB 1.4 AST manipulation API, video 2/3 at http://t.co/nVoghMHWNM #JEB #android

12:06am August 23rd 2013 via Falcon Pro

Useful Xposed mod: SIM Number Changer, change the number registered in your SIM card - http://t.co/VQmx4Fj3qP

12:01am August 23rd 2013 via Falcon Pro

RT @xdadevelopers: Massive Xposed Module Collection http://t.co/zLw5IK0pNz

11:56pm August 22nd 2013 via Falcon Pro

RT @AndroidPolice: Nexus Driver Binaries And Factory Images JSS15Q (2013 Nexus 7) And JWR66Y (All Others) Now Available For Download http://t.co/8SFEoLzy6U

11:35pm August 22nd 2013 via Falcon Pro

RT @jetleigh: Xiaomi's valuation is now almost 2.5x that of @htc http://t.co/0PrgwDDLXV #sad

9:44pm August 22nd 2013 via Falcon Pro

RT @_emboss_: OpenSSL PRNG Is Not (Really) Fork-safe http://t.co/KTgbWnFmsF

9:14pm August 22nd 2013 via Falcon Pro

RT @AndroidPolice: [Developer Changelog] AOSP Updated With The Latest Round Of 4.3 Fixes, Including Both JWR66Y (4.3_r1.1) and... http://t.co/31rla4WBDQ

9:10pm August 22nd 2013 via Falcon Pro

RT @alsutton: Looks like the security issue fixed in JWR66Y was related to SSL. No sign of a PRNG fix in it

9:09pm August 22nd 2013 via web

Android 4.3 (Jelly Bean) x86 Emulator System Image from Intel - http://t.co/BxuWaTVV8U

8:59pm August 22nd 2013 via web

RT @hubert3: Setting env var SSLKEYLOGFILE makes Chrome and Firefox log SSL keys which can be used to decrypt caps in Wireshark https://t.co/peQrrOW0a2

8:56pm August 22nd 2013 via Falcon Pro

RT @AndroidPolice: JSS15Q Update Rolling Out To 2013 Nexus 7 With A Multitouch Bug Fix http://t.co/tri6d14qlW

5:49pm August 22nd 2013 via Falcon Pro

RT @kapitanpetko: Patches for using SG3 with SEEK for Android. http://t.co/v5Zaq2DEoV

5:48pm August 22nd 2013 via Falcon Pro

I just backed Omate TrueSmart Developers Edition: Water-resistant standalone Smartwatch 2.0 on @Kickstarter http://t.co/Fab0pSslR6

2:45am August 22nd 2013 via Tweet Button

@HTCUSA there's an error in that pic: the HTC BlueAngel is from 2004, not 2001...

1:32am August 22nd 2013 via Falcon Pro in reply to HTCUSA

RT @AndroidPolice: Galaxy Nexus Also Gets JWR66Y Firmware Update, Here's The Direct Download http://t.co/dK7QZ1MxfG

5:45pm August 21st 2013 via Falcon Pro

RT @raviborgaonkar: 4G traffic Wireshark Dissector based on Samsung USB stick by Ramtin -> displays #LTE RRC and NAS messages. http://t.co/VZRs95UPho #securi

5:41pm August 21st 2013 via Falcon Pro

RT @kapitanpetko: Crude POC for repeating random numbers on Android: https://t.co/LXaGvbgsKa

5:25pm August 21st 2013 via Falcon Pro

RT @MarcosBL: What I learned from other's shell scripts (Tips & Tricks) http://t.co/CjySlAJKRc

12:29am August 21st 2013 via Falcon Pro

arm_perf_exploit.c, a new perf_event exploit (CVE-2013-4254), different from the semtex one: https://t.co/NjRIElcMAg via @marcograss

10:54pm August 20th 2013 via web

@t0mm13b @randomoracle this is just a test, was previously here: https://t.co/UTbVu78Ern . AFAIK the official fix is not in AOSP yet.

8:15pm August 20th 2013 via web in reply to t0mm13b

RT @randomoracle: #Android RNG vuln is exhibit A for sad state of mobile. Individual apps updating to compensate for platform bug since OS can't be updated

7:51pm August 20th 2013 via web

@kapitanpetko awesome post as always, congratulations! :)

7:49pm August 20th 2013 via web in reply to kapitanpetko

SecureRandom fix? RT @AndroidPolice T-Mobile Posts Nexus 4 Update JWR66Y, Brings "Security Improvements," http://t.co/0cfIr4ElHu

6:38pm August 20th 2013 via Falcon Pro

RT @kapitanpetko: Credential storage enhancements in Android 4.3 http://t.co/pP1CUCUy1X

6:33pm August 20th 2013 via Falcon Pro

RT @pandujar: Tracking users without cookies, javascript, etc... Using Etag: http://t.co/JHJc0yZYDL

6:29pm August 20th 2013 via Falcon Pro

RT @fabynou: Second Reality source code architecture was full of surprises: http://t.co/q2VJiI2TZg . A very interesting reading session !

6:19pm August 20th 2013 via Falcon Pro

RT @supercurio: Android stopping Wi-fi connection as it restores its password at first boot from your Google account is retarded http://t.co/eqPro5DUXy

5:52pm August 20th 2013 via Falcon Pro

RT @CyanogenMod: [Direct] CM Account and future release process - A glimpse into what we've been working on, and what's to come. http://t.co/dvPeDzaLcT

5:23pm August 20th 2013 via Falcon Pro

RT @NicolasFalliere: Feature to come in JEB 1.4: Full decompiled Java AST manipulation, clean up obfuscation, example at http://t.co/UBAVr46j9i #JEB #android

5:19pm August 20th 2013 via Falcon Pro

@adumont i have seen it, don't trust it. I can do the same manually without giving my credentials to any 3rd party.

5:02pm August 20th 2013 via Falcon Pro in reply to adumont

RT @alsutton: If you're building an #AOSP based firmware, here's a patch which should cover you for the SecureRandom issue - https://t.co/PVMdB54tx1

1:25pm August 20th 2013 via web

@JoseSelvi @vierito5 details here (scroll to pay by the day section): http://t.co/il4yyPjTEN voice is unlimited USA wide.

9:26am August 20th 2013 via web in reply to JoseSelvi

RT @the_ius: So CyanogenMod has released it's own Cerberus-esque tracking feature https://t.co/nUYIc53VVg

8:36am August 20th 2013 via Falcon Pro

I liked a @YouTube video http://t.co/bdNKo1Xu89 Komodo Mauro Picotto

12:03am August 20th 2013 via Google

Effective Inter-Component Communication Mapping in Android w/Epicc: A Step Towards Holistic Security Analysis -[PDF] https://t.co/rpFigPUJS5

11:20pm August 19th 2013 via web

RT @codelancer: Anti-decompiling techniques in malicious Java Applets http://t.co/3V3QSMiNGo @trompi

3:18pm August 19th 2013 via Falcon Pro

RT @agelastic: Using patched QEMU and IDA Pro to debug bootroms http://t.co/5UsWVVaEUO

3:01pm August 19th 2013 via Falcon Pro

#UbuntuEdge, the Formula 1 of smartphones, has raised over $10m in funding. Grab yours now for only $695! http://t.co/oRCQ7Tg0sw

2:10pm August 19th 2013 via Thunderclap

@JoseSelvi t-mobile prepaid sim card: unlimited data, unlimited voice and unlimited text for $3/day at 3G/4G speed, or $2/day at 2G speeds.

8:52am August 19th 2013 via Falcon Pro in reply to JoseSelvi

RT @m_spreitz: Android Malware is using GCM as C&C-Channel-- http://t.co/gxaTfkySoZ

8:46am August 19th 2013 via Falcon Pro

@adumont do 'adb backup -apk your.twiter.app' then 'adb resrotre' it on the tablet.

8:25am August 19th 2013 via Falcon Pro in reply to adumont

@mncoppola good luck in both, exams and popping shells :)

6:06am August 19th 2013 via Falcon Pro in reply to mncoppola

RT @xdadevelopers: NFC-Removal Actions Updated to Xposed Module http://t.co/Aatrd0cPTz

2:43am August 19th 2013 via Falcon Pro

RT @AndroidPolice: Koush Works Around Chromecast Developer Whitelist: AirCast Beta APK Available Now For Drive And Dropbox Streaming http://t.co/s5xhxmjPKO

12:34am August 19th 2013 via web

well done with login verification, now I only wish it worked without the need to have official twitter app installed http://t.co/Rq0UTzR3OB

12:32am August 19th 2013 via Falcon Pro

RT @climagic: yes "$(seq 231 -1 16)" | while read i; do printf "\x1b[48;5;${i}m\n"; sleep .02; done # A rainbow in your shell.

12:05am August 19th 2013 via Falcon Pro

RT @newsycombinator: Open Source Google App Engine Clone https://t.co/3kkwNwJjO9

10:22pm August 18th 2013 via Falcon Pro

RT @trufae: Sample code to switch between arm and thumb without using compiler hints. http://t.co/73FZn6zjTi #arm #reversing #specs #lowerbit

7:07pm August 18th 2013 via Falcon Pro

RT @timstrazz: Proper DEX file, zImage and #Android resources added to the 'file' command magic file typing :D https://t.co/T7tnITWkLH

7:05pm August 18th 2013 via Falcon Pro

@timstrazz they are feds, sitting this way so they can see your screen from both angles :P

7:02pm August 18th 2013 via Falcon Pro in reply to timstrazz

An update to the Cerberus situation (apparently fixed) - http://t.co/vza6Ivhv8i

3:21pm August 18th 2013 via Falcon Pro

Android App with 60 threads with Foreground priority can reboot Android userspace - https://t.co/94SgI7WUB0 code: - http://t.co/lCacTU623x

3:05pm August 18th 2013 via Falcon Pro

Very informative documentation page about Security-Enhanced Linux (SELinux) in Android, with some use cases - https://t.co/r6KFkCyjpc

1:21pm August 18th 2013 via web

RT @markrussinovich: Hacker posts Facebook bug report on Zuckerberg’s wall — RT News: http://t.co/d2BfVuKGLA

12:17am August 18th 2013 via Falcon Pro

RT @virusbtn: Kaspersky's @ostefano explains what SELinux is and what it means for Android 4.3 https://t.co/klvCD7e7Cm

11:59pm August 17th 2013 via Falcon Pro

@interferencies oh, en lo tranquils q estàvem! m'haureu de tornar a explicar el fora de joc, que de la temporada passada ja se m'ha oblidat

7:05pm August 17th 2013 via Falcon Pro in reply to interferencies

@thegrugq @JZdziarski yes, but comes handy to create & remove them quickly when you're working with a very long path, and is not bloated :)

6:54pm August 17th 2013 via Falcon Pro in reply to thegrugq

RT @JZdziarski: Quickly navigate your filesystem from the command-line http://t.co/FABbKOqvPM

6:49pm August 17th 2013 via Falcon Pro

RT @agelastic: Reversing Qualcomm L4/AMSS http://t.co/ISNw84MdhI by Tim Newsham of all people!

3:25pm August 17th 2013 via Falcon Pro

Cerberus anti-theft - an exploit allowing you to access any device - http://t.co/uUrCnws7bW

11:41am August 17th 2013 via Falcon Pro

RT @sweis: Zmap scans the entire IPv4 internet in 45 minutes: https://t.co/nVxoKMta7Z

11:54pm August 16th 2013 via Falcon Pro

RT @cpu: If you missed @davidbb and my poster at @USENIXSecurity last night, see PDF version: http://t.co/UGfUvSjHcL Baton: Key Agility for Android

11:30pm August 16th 2013 via Falcon Pro

RT @BlueboxSec: #Blackhat presentation on #Android master key #vulnerability from @j4istal now available http://t.co/MAEF3jxGpL

10:58pm August 16th 2013 via Falcon Pro

RT @skier_t: Darm Update - More ARMv7, More Thumb http://t.co/MeohhwWGA5 #armv7 #disassembler

2:11pm August 16th 2013 via Falcon Pro

RT @whispersystems: We're rolling out an application-level workaround for the Android PRNG vulnerability: https://t.co/pv8zbyVAqo and https://t.co/yrrIH5EfwU

7:20pm August 15th 2013 via Falcon Pro

RT @mwrdrozer: Want to find apps using SecureRandom? There's a drozer module: dz> module install secure_random; dz> run scanner.misc.securerandom

5:27pm August 15th 2013 via Falcon Pro

RT @alsutton: Saddest thing about @AndroidDev Crypto issue blog post; the statement " Those patches have been provided to OHA partners." #WhyNoAOSP

10:54am August 15th 2013 via Falcon Pro

Android Developers Blog: Some SecureRandom Thoughts - http://t.co/tMFD0gQoYx

4:13am August 15th 2013 via Falcon Pro

RT @TeamAndIRC: @cyanogen @moxie @ioerror key changes are possible without wipinh data, we have seen OEMs do it before

3:19am August 15th 2013 via Falcon Pro

RT @cyanogen: @moxie @ioerror That said, we're soon going to be providing user builds (private keys) along side the userdebug (test keys) builds.

3:16am August 15th 2013 via Falcon Pro

RT @cyanogen: @moxie @ioerror The signing keys issue is a tradeoff between hackability and security. Changing keys requires wiping out your data.

3:16am August 15th 2013 via Falcon Pro

@timstrazz @collinrm sounds familiar... i think i created that file ;)

2:45am August 14th 2013 via Falcon Pro in reply to timstrazz

@ChrisJohnRiley seen your email, a bit busy right now, will reply later sorry

3:57pm August 13th 2013 via Falcon Pro in reply to ChrisJohnRiley

RT @iamnion: our #usenix #sec13 paper: Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks http://t.co/rafOflSUUB

3:33pm August 13th 2013 via Falcon Pro

RT @timstrazz: Great Google ups the chrome bug bounties… Why haven't they started bounties for #Android again?

6:11am August 13th 2013 via Falcon Pro

Useful Android apps for Android Developers - http://t.co/u2x36LSC5u

3:02am August 13th 2013 via Falcon Pro

AppOps activity commented out in AOSP settings Manifest file (via @Amon_RA) - https://t.co/SfVhvWhffu

2:35am August 13th 2013 via Falcon Pro

RT @cpu: Given Android 4.2+ switched SecureRandom to use OpenSSL: http://t.co/WL31DpO8fI can we assume the Bitcoin wallet flaw was limited to <4.2?

2:09am August 13th 2013 via Falcon Pro

RT @collinrm: Mobile Security News Update August 2013 http://t.co/elGDk6QFTA

1:57am August 13th 2013 via Falcon Pro

RT @msecnet: My #defcon slides with demo video are here: http://t.co/g1jpM8zGf0 You should try them and let me know if it works on your carrier

1:38am August 13th 2013 via Falcon Pro

RT @iamnion: Analysis of authentication and key establishment in inter-generational mobile telephony http://t.co/punsM5jXF6 #gsm #lte #3g #academia

1:29am August 13th 2013 via Falcon Pro

@CarlosLahita @iolandatweets tendrás que pillar un coche para hacer las visitas...

1:05am August 13th 2013 via Falcon Pro

@timstrazz instead of patching the signature verification, lol!

1:04am August 13th 2013 via Falcon Pro in reply to timstrazz

RT @JojiHamada: North Korea's first smartphone called "Arirang" appears to be running Android. Would love to get one and research. http://t.co/HzQ3zIK7gJ

7:48am August 12th 2013 via Falcon Pro

RT @TeamAndIRC: and HTC exploit from XDA Dev Con, 4.0 to 4.2.2, fixed in 4.3 instructions on XDA or G+ Android Security Discussions http://t.co/6o6zHFBGc2

7:41am August 12th 2013 via Falcon Pro

RT @TeamAndIRC: These two roots are likely the last public roots from me, and both were disclosed to Google/Cisco/LG months in advance. Buy unlocked phones

7:40am August 12th 2013 via Falcon Pro

RT @TeamAndIRC: RT @xdadevelopers Post: [8833099] BackupManagerService 4.x - 4.2.2 vuln (HTC 4.x - 4.2.2 POC) XDA:DevCon http://t.co/NqIYjvoi2L

7:40am August 12th 2013 via Falcon Pro

RT @TeamAndIRC: Here is the fix for the BackupManagerService vuln from XDA:DevCon https://t.co/VnaZWuzqI3

7:40am August 12th 2013 via Falcon Pro

RT @TeamAndIRC: RT @xdadevelopers Post: [CVE-2013-3741] LGInstallServices Silent Install + Privilege escalation XDA:DevCon http://t.co/9RlJe87HT1

7:38am August 12th 2013 via Falcon Pro

@timstrazz just visited @rallat at lookout, too bad you weren't there. I hope bebop is ok

6:27pm August 9th 2013 via Falcon Pro

RT @timstrazz: Quick 'n dirty Android boot/recovery zImage #010Editor template https://t.co/qh4lWOTGo9

4:01pm August 9th 2013 via Falcon Pro

RT @AndroidPolice: Jean-Baptiste Quéru, Post-Nexus 7 Factory Image Debacle: "I'm Quitting AOSP" http://t.co/pFnW0PC8oe

5:40am August 8th 2013 via Falcon Pro

RT @AndroidPolice: Legal Issues With Qualcomm May Prevent Factory Images For New Nexus 7 ('Flo') From Ever Being Published, JBQ... http://t.co/HaDmsaS2Ar

5:00am August 8th 2013 via Falcon Pro

RT @skier_t: Solving ZCrackme#2: A Custom Emulator Approach http://t.co/zKwhGWA8nk CC @zimperium

4:54am August 8th 2013 via Falcon Pro

RT @grsecurity: CVE-2013-4205 http://t.co/s2kSr0pkZU for(;;)unshare(1<<28); => leaking full cap cred structs until kernel panic

5:02am August 7th 2013 via Falcon Pro

RT @nils: Seems like the Firefox vuln used against Tor users is CVE-2013-1690 reported by me in April and fixed since June http://t.co/XAESQYFoSa

3:55pm August 5th 2013 via Falcon Pro

RT @evdokimovds: ARM/Thumb decompiler for IDA Pro http://t.co/B29dZ4Lgi7 (source code) http://t.co/5TYtcrrsxv

3:54pm August 5th 2013 via Falcon Pro

RT @viaforensics: Defeating #SEAndroid PoC videos and code from @pof - as presented at @_defcon_ : https://t.co/kuuJ1rvEYt

3:43pm August 5th 2013 via Falcon Pro

@trufae haha... i've a t-mobile sim card with data on my phone, not using public wifi at all ;)

3:05pm August 5th 2013 via Falcon Pro in reply to trufae

watching PPP, winners of the #defcon #ctf, getting black badges in the defcon closing ceremony http://t.co/W8bVha3u31

1:23am August 5th 2013 via Falcon Pro

@adi1391 @sunnyrockzzs I'm with @jduck, we're in the closing ceremony near the back, in front of a screen

1:09am August 5th 2013 via Falcon Pro in reply to adi1391

@pinkflawd great talk, congrats!

7:56pm August 4th 2013 via Falcon Pro

RT @CM_arcee: SEAndroid policies back on track for +CyanogenMod 10.2 :-) http://t.co/KjskEmorjv

7:01pm August 4th 2013 via Falcon Pro

RT @atimorin: simple way to know passwords of all users on *nix : sudo strace -f -e "read" -p <pid_of_sshd> 2>log

4:31pm August 4th 2013 via Falcon Pro

RT @AndroidPolice: Android Bluetooth Exploit For Japanese Toilet Brings New Meaning To The Word "Vulnerability" http://t.co/gwEzIV75ug

3:56am August 4th 2013 via Falcon Pro

@adi1391 busy tonight sorry, will you be at the Rio tomorrow? would be nice to catch up with you :)

1:55am August 4th 2013 via Falcon Pro in reply to adi1391

@Joshua_Brindle i mentioned them in the slides, but they are not in official 4.3 (just separate git branches on bitbucket)

1:03am August 4th 2013 via Falcon Pro in reply to Joshua_Brindle

Slides from @craigtweets Defcon presentation: "Android weblogin: Google's skeleton keys" - [PDF] http://t.co/30m9WuXsIY

12:49am August 4th 2013 via Falcon Pro

RT @gtvhacker: We've updated our blog with more info on our #DEFCON #GoogleTV boot-loader exploit and root methods. Check it out at http://t.co/y1TJxxtj7q

12:13am August 4th 2013 via Falcon Pro

My slides for Defeating SEAndroid #DEFCON 21 Presentation are up - https://t.co/U7YLCzp39E will post videos and PoC later

10:45pm August 3rd 2013 via Falcon Pro

@rallat jajaja que bona la foto, merci :)

10:34pm August 3rd 2013 via Falcon Pro in reply to rallat

@TeamAndIRC yes, sure... let me know when you come so i can bring the bottle downstairs

10:34pm August 3rd 2013 via Falcon Pro in reply to TeamAndIRC

@deese jaja, estas por aquí? no te he visto!

10:32pm August 3rd 2013 via Falcon Pro in reply to deese

RT @djrbliss: One of the ASLR bypass techniques @ochsff and @defendtheworld presented at Black Hat was killed within hours: http://t.co/w4n3hNFM9A

6:41pm August 3rd 2013 via Falcon Pro

SignMe Android crackme by pnluck: unlock screen finding the right movements - http://t.co/dxxpqiJOjF

1:32am August 3rd 2013 via Falcon Pro

@QuarkSec sure, I'm already out today but please ping me again tomorrow :)

12:39am August 3rd 2013 via Falcon Pro in reply to QuarkSec

RT @_defcon_: #DEFCON: The Documentary is now available to all! The torrent can be found at https://t.co/IOHTAnI0AK! Enjoy!

11:50pm August 2nd 2013 via Falcon Pro

@msecnet @ChrisJohnRiley @TeamAndIRC after the talks today maybe? (jcase bring a backpack today)

11:49pm August 2nd 2013 via Falcon Pro in reply to msecnet

RT @s7ephen: A page from our "ARM Exploitation" Lab Manual: "Glossary of our Slang Exploitation Terminology" (cc @ochsff) http://t.co/h578bwvz9Q

11:43pm August 2nd 2013 via Falcon Pro

RT @duosec: Check out @akgood as he describes another exploit of Google Chrome's OAuth2 tokens: https://t.co/RYGR3AuTwG

11:39pm August 2nd 2013 via Falcon Pro

The @gtvhacker DEF CON 21 Files and slides, already available right after the presentation - http://t.co/WH6mkbA2IK

10:44pm August 2nd 2013 via Falcon Pro

@rallat at @timstrazz talk, track 2. will be at track 3 after that.

7:21pm August 2nd 2013 via Falcon Pro in reply to rallat

. @timstrazz on the stage... ready to rock :)

6:54pm August 2nd 2013 via Falcon Pro

official Google solution to locate, ring and remotely wipe an android device - http://t.co/Q3yo0HScbU

6:04pm August 2nd 2013 via Falcon Pro

awesome & fun talk @TomRittervg, loved the demos :)

5:52pm August 2nd 2013 via Falcon Pro

@cpu we're in the same room :P

4:56pm August 2nd 2013 via Falcon Pro in reply to cpu

RT @thuxnder: #droidsec #qualcomm party was great. THX! Finally met @saurik @jduck @TeamAndIRC @vlad902 @djrbliss and of course @pof @collinrm @quine

4:02pm August 2nd 2013 via Falcon Pro

awesome night yesterday with #droidsec and #qualcomm guys, thanks @jduck @iamnion and everyone who joined!

3:36pm August 2nd 2013 via Falcon Pro

RT @gtvhacker: If you are looking to keep your #Chromecast root, we recommend moving the otacerts.zip file to otacerts.zip.bak within /system/etc/security/

2:45pm August 2nd 2013 via Falcon Pro

RT @AndroidPolice: PSA: The Latest Chromecast Over-The-Air Update (12840) Patches The Bootloader Exploit Used To Obtain Root http://t.co/KDB88MhFMs

2:43pm August 2nd 2013 via Falcon Pro

RT @mwrdrozer: The wait is over... drozer is officially released! Get it here: http://t.co/zkpEKECv3U

2:27pm August 2nd 2013 via Falcon Pro

RT @TeamAndIRC: At Qualcomm get togethervwith @pof @saurik @djrbliss @jduck hell everyone

6:17am August 2nd 2013 via Falcon Pro

@timstrazz @rallat where are you? come to the galleria bar for #droidsec

4:25am August 2nd 2013 via Falcon Pro

trying Google #glsss at the #droidsec meetup, with @thuxnder :) http://t.co/tOZgA1HUAN

4:24am August 2nd 2013 via Falcon Pro

@jduck @collinrm @s7ephen @ochsff @quine hoping to see you at the galleria bar now... #droidsec

3:42am August 2nd 2013 via Falcon Pro

@insitusec I'm at Harrah's waiting for the shuttle, will be in the Rio in a while

1:47am August 2nd 2013 via Falcon Pro in reply to insitusec

finally got a t-mobile sim card with unlimited data!

1:02am August 2nd 2013 via Falcon Pro

@timstrazz got mine this morning, but i still don't have a US SIM card... see u later :)

7:17pm August 1st 2013 via Falcon Pro in reply to timstrazz