Tweets from November 2013

RT @sehnaoui: This is either an absolutely brilliant marketing campaign or the most awkward spelling mistake ever. http://t.co/e1CtpxHuv0

3:11pm November 30th 2013 via Falcon Pro

Slides on Android class 0 SMS DoS by @msecnet, 0class2DoS - http://t.co/tXKhu2xPd5

11:19pm November 29th 2013 via Falcon Pro

RT @AndroidPolice: SMS Vulnerability In Nexus Devices Can Be Exploited To Force A Reboot Or Kill Cellular Connectivity http://t.co/GppYz5nILN

11:16pm November 29th 2013 via Falcon Pro

RT @mncoppola: Cleaning out my hard drive... found some old Android root exploits https://t.co/xdgv4Iw6lw https://t.co/8LbZl2SQK4

8:21am November 29th 2013 via Falcon Pro

RT @kalenz: Sources of our HBOOT debugger presented at Hack.lu 2013: https://t.co/VJV5jsKmqh (cc @saidelike)

8:16am November 29th 2013 via Falcon Pro

RT @carlosacastillo: CVE-2013-6271: Remove Device Locks from Android Phone http://t.co/9xyKFPKhwn - Bug in com.android.settings.ChooseLockGeneric

8:16am November 29th 2013 via Falcon Pro

new gadget, Mad Catz arcade Fightstick Pro, to win all Super Street Fighter II Turbo matches! :) http://t.co/1GLjIbpn3B

4:35pm November 28th 2013 via Falcon Pro

RT @mwrlabs: More vulns in Ad libraries. Today Millenial Media http://t.co/lrLApq89X5. See http://t.co/uO9DBPZ8yq for background.

10:43pm November 27th 2013 via Falcon Pro

The video of my Defcon 21 talk is on youtube! Watch "Defeating SEAndroid" - http://t.co/vaPUfZuyVc

9:44pm November 27th 2013 via web

@quine @PatrickMcCanna cool, i didn't know the video was already uploaded! :D

9:38pm November 27th 2013 via web in reply to quine

RT @PatrickMcCanna: Nice defcon demo on demonstrating some early ways to defeat SElinux policies in SEAndroid: http://t.co/F5peDVxnKQ

9:37pm November 27th 2013 via Twitter Web Client

RT @reversemode: Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses http://t.co/FdaTUBvV1K

7:16pm November 26th 2013 via Falcon Pro

RT @BlueboxSec: Jeff Forristal's Black Hat 2013 talk is now online. Android: One Root to Own Them All https://t.co/6cjYpJ6V8y

7:31am November 26th 2013 via Falcon Pro

RT @kutyacica: Info leak in genlock driver, found by @JonathanSalwan http://t.co/msYD8UI2XV fwiw we fix but do not release advisories for this type of bug.

11:28pm November 25th 2013 via Falcon Pro

RT @TeamAndIRC: Kindle Fire HDX 8.9 root via @fi01_IS01 's get_user/put_put user exploit http://t.co/TNXa56KQ4q

11:08pm November 25th 2013 via Falcon Pro

RT @AndroidPolice: [New App] App Ops Lives On In Android 4.4, Can Now Deny Even More Permissions - Here's How You Can Access It http://t.co/dYFfZHwC5W

11:02pm November 25th 2013 via Falcon Pro

RT @cryptax: Oops, had committed everything except hidex.pl ;( It's now on github w/ detection of hidden method https://t.co/xRyZ7uHHXB cc: @ahmad_aabed

11:00pm November 25th 2013 via Falcon Pro

RT @snowfl0w: Contagio Mobile http://t.co/vRgbYdPh2Y 20 mobile malware trojans - mostly from the 2nd half of 2013. Let me know if I missed anything

10:49pm November 25th 2013 via Falcon Pro

RT @TeamAndIRC: TwerkMyMoto, Razr I (x86) root exploit https://t.co/PfpaQWN4F2

7:25pm November 24th 2013 via Falcon Pro

RT @xdadevelopers: Xposed Framework Now Compatible with Android 4.4 http://t.co/gu0BDaSVNl

6:43pm November 24th 2013 via Falcon Pro

I liked a @YouTube playlist http://t.co/ZgGlSsEkUU Tournament of

7:11am November 24th 2013 via Google

RT @iolandatweets: Today, at Micro 8bit Fest Bcn Noisy-freaky-weird concert #chiptune http://t.co/TAgLuuWLt3

9:42pm November 23rd 2013 via Falcon Pro

@hhg2288 era aquí: http://t.co/yOJJeNCaaB supongo que subirán algo a YouTube

8:44pm November 23rd 2013 via Falcon Pro in reply to hhg2288

#chiptune at its finest! featuring @neuroflip at Micro 8bit Fest bcn! /cc @trufae http://t.co/vuCtoctxU7

7:30pm November 23rd 2013 via Falcon Pro

listening 4Dboy at Micro 8bit Fest #chiptune festival Barcelona \m/ http://t.co/pFWVE9CfwT

7:10pm November 23rd 2013 via Falcon Pro

Just purchased Tournoi des Legendes OST @bandcamp: http://t.co/OdF52mOMYM awesome music for #chiptune #SuperTurbo #StreetFighter fans :D

4:08pm November 23rd 2013 via Tweet Button

RT @trufae: If you are a paranoid and you use a mobile phone you should read this. https://t.co/2ChOQR9mhg #simtoolkit #thc #gsm #hacking

9:00pm November 22nd 2013 via Falcon Pro

@MordodeMaru he visto la de fsecure pero no pa he probado (no me aporta nada), las de xposed si las he usado, aunque no me acaban de conv.

1:04am November 22nd 2013 via Falcon Pro in reply to MordodeMaru

RT @andremoulu: The Android Dynamic Binary Instrumentation Toolkit & Dynamic Dalvik Instrumentation Toolkit from @collinrm https://t.co/4H91pRCazz

12:01am November 22nd 2013 via Falcon Pro

RT @jonoberheide: Any of the CSAW teams use the stackjacking vector in @mncoppola's challenge? http://t.co/V5jJjcqBbM

11:57pm November 21st 2013 via Falcon Pro

RT @AndroidPolice: Google Engineer Dan Morrill Sheds Some Light On The Nexus OTA Process, Urges You To Never Clear Google Service... http://t.co/IH6z1Qfvov

11:51pm November 21st 2013 via Falcon Pro

RT @AndroidPolice: The Physical Google Wallet Card Is Real, And You Can Order One Now http://t.co/svvmkINIrH

11:43pm November 21st 2013 via Falcon Pro

RT @AndroidPolice: [Developer Changelog] KRT16O To KRT16S, Critical Bug In Full-Disk Encryption Explains Hotfix http://t.co/wGzdjHrbUa

11:41pm November 21st 2013 via Falcon Pro

RT @mwrlabs: Details of code execution vulnerabilities in AppLovin ad network http://t.co/jdnNMKj3yZ

11:35pm November 21st 2013 via Falcon Pro

Paper: Pre-filtering Mobile Malware with Heuristic Techniques - [PDF] http://t.co/2MDfKQCDv7

12:26pm November 20th 2013 via web

RT @insitusec: make using gdbserver on android a little easier with some simple scripting http://t.co/AHAwaTyrXt

8:14am November 20th 2013 via Falcon Pro

RT @AndroidPolice: Google Seeks To Reward Proactive Security Improvements In Android By Expanding Patch Rewards Program To AOSP http://t.co/gjj3s5z3rB

9:12am November 19th 2013 via Falcon Pro

RT @timstrazz: "Even more patch rewards", "All the open-source components of Android: Android Open Source Project" http://t.co/HOm4CzMu7y < Nice!

9:12am November 19th 2013 via Falcon Pro

RT @insitusec: finally embraced @giantpune's Makefile (w/ some personal tweaks) for building native Android stuffs http://t.co/IgXo45tggI

8:53am November 19th 2013 via Falcon Pro

RT @trufae: Here's my toy emscripten crackme (first ever asm.js heap overflow exploitation?) just as a PoC for fun :) Enjoy! http://t.co/8GjDYc9qze

7:14am November 18th 2013 via Falcon Pro

Unofficial Xposed framework for Android KitKat 4.4 (works with Greenify) - http://t.co/1V0R9YQdfG

6:37pm November 17th 2013 via Falcon Pro

RT @jduck: Tired of strace binaries crashing on the Androids?! Build it static! https://t.co/UmNlhop63E

10:42am November 17th 2013 via Falcon Pro

RT @Fuzion24: I wrote a 176 byte Android hello world in ARM ASM: https://t.co/4UgnddSaoq

6:52pm November 16th 2013 via Falcon Pro

RT @Fuzion24: Here's a fun android root shell; unsantized input to netd: https://t.co/6gdb5bKukQ

6:23pm November 16th 2013 via Falcon Pro

RT @securitea: This looks like the commit for PinkiePie's sandbox escape: http://t.co/ZuO4PiQ33c // cc: @scarybeasts

8:27am November 16th 2013 via Falcon Pro

RT @dragosr: Lots of speculation about PinkiePie's exploit & KitKat. KitKat nexus released on morning.of pwn2own (heh pattern?) So vuln in 4.4 too.

8:26am November 16th 2013 via Falcon Pro

Installing ARM Translation (libhoudini) and Google Play GApps in Genymotion 2.0+ - http://t.co/TOU3b6Ad7Y

2:28am November 16th 2013 via web

RT @PaulOBrien: Er what? Play Store? RT @HTCUSA Timing of push via PlayStore to be determined by Google.

11:31pm November 15th 2013 via Falcon Pro

RT @HTCUSA: Good news, we've delivered KitKat code to Google for HTC One GPE. Timing of push via PlayStore to be determined by Google.

11:31pm November 15th 2013 via Falcon Pro

RT @AndroidPolice: Here Are The Details Of Recently Discovered Vulnerabilities That Allowed Any App To Gain Root Privileges With... http://t.co/FydA2HycPp

9:20pm November 15th 2013 via Falcon Pro

RT @grsecurity: It's unfortunate that in 2013 this message still needs to be drilled in people's heads: http://t.co/RbahJXixPq

9:09pm November 15th 2013 via Falcon Pro

I liked a @YouTube video from @tubeknow http://t.co/CBdH3LBKZA EVO 2012 TOP 8 Super Turbo Tourn. Of Legends COMPLETE EDITION HD

9:05pm November 15th 2013 via Google

Test for vroot exploit in Android CTS - https://t.co/VZ44akde9m

12:16pm November 15th 2013 via TweetDeck

RT @esizkur: Uploaded my @PacSecjp slide deck from yesterday: https://t.co/l9ijp5VoSL

10:16am November 15th 2013 via Falcon Pro

RT @mwrinfosecurity: Something for nothing? True cost of free - http://t.co/th4gDbTj8A

10:14am November 15th 2013 via Falcon Pro

RT @TeamAndIRC: LG's backdoor is now detected in CTS https://t.co/tTNUGvQhaY

10:00am November 15th 2013 via Falcon Pro

RT @scarybeasts: Nice, the home team managed to get a _mobile_ release / update done in <24hrs too! http://t.co/j5lAEv70eL

9:58am November 15th 2013 via Falcon Pro

RT @rhatdan: How do you explain #SELinux Enforcement models? Check out this simple explanation @opensourceway @redhatNews http://t.co/Gk8ConJ1FO

9:48am November 15th 2013 via Falcon Pro

RT @jduck: Does anyone have the vroot exploit that uses CVE-2013-6282?

9:45am November 15th 2013 via Falcon Pro

@jduck is this ANDROID-11234878 (chinese vroot exploit)?

8:53pm November 14th 2013 via web in reply to jduck

how run-as is handled on Android 4.3+, using enhanced file capabilities instead of set-uid: https://t.co/dMQBlJbpDb

8:47pm November 14th 2013 via web

RT @AndroidPolice: Android 4.4 KitKat Factory Images And Binaries Are Up For Nexus 4, All Variants Of Nexus 7 (2012 And 2013), And... http://t.co/O4C7z19EDG

8:39pm November 14th 2013 via Falcon Pro

RT @jduck: CVE-2013-6282 Affects all Android devices 4.0.x - 4.3 (inclusive) except moto x, note 3, and nexus 10. Android 4.4+ is fixed.

8:39pm November 14th 2013 via Falcon Pro

RT @jduck: Missing access checks in put_user/get_user kernel API (CVE-2013-6282) http://t.co/c4m8mJlTsi - I found this during my REcon 2013 research

8:38pm November 14th 2013 via Falcon Pro

RT @lennyzeltser: Automated analysis of Android malware: http://t.co/zpmocLvUBe < Anyone has good or bad things to say about this new online tool for APKs?

8:36pm November 14th 2013 via Falcon Pro

@alsutton @skillsmatter yeah, should do next year... didn't know there were so many security related talks, i thought it was more devel.

2:22pm November 14th 2013 via Falcon Pro in reply to alsutton

@skillsmatter no rush, just wondering what happened with it cos I saw some others and was also interested in this one. Thanks!

2:10pm November 14th 2013 via Falcon Pro in reply to skillsmatter

@commonsguy lol, wear a hat for next conf. then :D

11:51am November 14th 2013 via Falcon Pro in reply to commonsguy

@skillsmatter this video is still missing: http://t.co/3PlrmK3V5D any ETA? cc @commonsguy

11:44am November 14th 2013 via web

RT @dragosr: PacSec pwn2own mobile: PinkiePie pwned both Galaxy S4 and Nexus phones with a system library vuln from a web page.

11:05am November 14th 2013 via Falcon Pro

RT @scottyab: My slides from last nights @BCSBristol autumn app school, just shout if u have questions https://t.co/7zKEqAjm49 #android

10:00am November 14th 2013 via Twitter Web Client

fs_config: Update OTA to understand SELinux labels & capabilities (If no available use the old set_perm calls) - https://t.co/QwJXS5NdRH

9:57am November 14th 2013 via web

more details on Android Superuser / SuperSU vulnerabilities - http://t.co/Bsl37AJXFb

9:24am November 14th 2013 via web

Superuser "su --daemon" vulnerability on Android >= 4.3 - http://t.co/YZVBPtiGVS

9:18am November 14th 2013 via web

Android Superuser shell character escape vulnerability - http://t.co/TIP5JhBcJN

9:18am November 14th 2013 via web

Superuser unsanitized environment vulnerability on Android <= 4.2.x - http://t.co/wDDdi8WwBV

9:18am November 14th 2013 via web

RT @dragosr: PacSec: @esizkur tells us about the baseband firmware update verifications on some phones: none, no checksums, no certs, zilch.

8:29am November 14th 2013 via Falcon Pro

RT @dragosr: PacSec: @m0nk_dot covers the most devastating stealth hiding vector for flash memory.... just mark the blocks bad. Kills all forensics util.

8:29am November 14th 2013 via Falcon Pro

RT @thezdi: Chrome on a Nexus 4 and Samsung Galaxy S4 falls http://t.co/jZcBlSTus2 #pwn2own

7:47am November 14th 2013 via Falcon Pro

RT @thezdi: Pinkie Pie successfully compromised Chrome on a Nexus 4 and then on a Samsung Galaxy S4 - just for show. #pwn2own

7:43am November 14th 2013 via Falcon Pro

FakeOperator: Cydia Substrate tweak (for Android & iOS) to easily change your operator's name - http://t.co/rrOAegTczL

3:10am November 14th 2013 via Falcon Pro

RT @portcullislabs: ... and finally: http://t.co/zCJgqtq9J4, a tool to identify all(?) the vhosts for a given host.

2:56am November 14th 2013 via Falcon Pro

RT @AndroidPolice: Massive Google Search 3.1.8 Update Rolling Out, Brings Google Experience Launcher To All 4.1+ Devices, New Cards,... http://t.co/tYFtYKGgnA

12:42am November 14th 2013 via Falcon Pro

@cheru2 let us know how it goes! I wish I was there too :) enjoy!

12:37am November 14th 2013 via Falcon Pro in reply to cheru2

RT @headhntr: If you're into mobile security and haven't watched @esizkur's talk, "All Your Baseband Are Belong To Us", do it now. http://t.co/4p3eaMYFR4

12:36am November 14th 2013 via Falcon Pro

From #ZeroNights 2013: Advanced exploitation of Android Master Key Vulnerability (bug 8219321) - [zip, russian] http://t.co/8epiykhdl7

12:35am November 14th 2013 via Falcon Pro

RT @xdadevelopers: Easily Change Your Android SELinux Mode http://t.co/EkJ8Feo1SS

12:10am November 14th 2013 via Falcon Pro

RT @TeamAndIRC: A wild root exploit for @oppo N1 appears https://t.co/ttWRQHg9Ti

11:12pm November 13th 2013 via Falcon Pro

RT @AndroidPolice: [KitKat] 2012 Wi-Fi Nexus 7 Owners, It's Your Turn To Download And Flash Android 4.4 OTA Update (KRT16O) http://t.co/K54YRu2q4m

11:08pm November 13th 2013 via Falcon Pro

RT @supercurio: Awesome tool by @Qualcomm_Dev: Trepn: https://t.co/w7KKpQ3zSj https://t.co/kzewFMk9EC I love it :) Should be useful to devs & reviewers

11:07pm November 13th 2013 via Falcon Pro

RT @TeamAndIRC: .@oppo shipping new devices with vulnerabilities that have been public for a year? :/ disappointed I am

10:50pm November 13th 2013 via Falcon Pro

RT @ZeezTweetin: ZeezOnline » Install Google Play on Genymotion 2.0 http://t.co/pY8NwUkmpH #genymotion #android #developer #tutorial

10:50pm November 13th 2013 via Falcon Pro

Quickly get a list of every UI element on your android screen: $ adb shell uiautomator dump /dev/tty

7:52pm November 13th 2013 via web

Nice, Android Backup (unpacker / packer) written in python - https://t.co/SOOfqd1AOT

7:19pm November 13th 2013 via web

LastPass Android container PIN and auto-wipe security feature bypass - http://t.co/Suem1La7Vd (by @ChrisJohnRiley)

7:15pm November 13th 2013 via web

RT @newshtwit: @TomRittervg @newsycombinator trustzone is the cpu mode. the OS thats usually running there is called "mobicore".

1:35pm November 13th 2013 via Twitter Web Client

Defeating SSL Certificate Validation for Android Applications - [PDF] https://t.co/qHy32LcWvY

1:34pm November 13th 2013 via web

Intrinsec Android SSL Patch: Utility to patch Android applications to circumvent HTTPS connections - https://t.co/dD9SgA8hjS (via @0xroot)

1:32pm November 13th 2013 via web

RT @AndroidPolice: How To Try The Google Experience Launcher With Translucent Bars And Google Now Once You Get Your KitKat Update... http://t.co/MzR3xutXPl

12:53pm November 13th 2013 via Falcon Pro

@thezdi was this S4 running a KNOX-enabled firmware?

12:37pm November 13th 2013 via web in reply to thezdi

@cocaman @googlenexus yeah, it was already on the news last week, but I don't like it

12:21pm November 13th 2013 via Falcon Pro in reply to cocaman

Also my script to keep root between OTA updates worked like a charm - https://t.co/mFw6I3BTb7

12:05pm November 13th 2013 via web

Updated Nexus7 2013 to 4.4, has stock launcher != Nexus5 launcher. @googlenexus I don't like this inconsistency between Nexus products :(

12:03pm November 13th 2013 via web

RT @ChainfireXDA: SuperSU updated to v1.69 - https://t.co/AqRypDr2CF - recommend immediate update

11:11am November 13th 2013 via Falcon Pro

RT @AndroidPolice: Your KitKat Is Ready: Download And Flash Android 4.4 OTA Update (KRT16O) For 2013 Wi-Fi Nexus 7 http://t.co/H0YF8KIwZh

10:33am November 13th 2013 via Falcon Pro

RT @kutyacica: @TomRittervg @pof @newsycombinator that article is based on a 2010 talk. For a more realistic picture, check Ralf's PacSec presentation

10:33am November 13th 2013 via Falcon Pro

RT @beist: Anyone know if the GS4 pwned by a japanese team at #pacsec had KNOX?

10:31am November 13th 2013 via Falcon Pro

RT @dragosr: PacSec pwn2own S4 exploit PoC was particularly elegant, triggered from web, silent sw pkg install, root privs. Looking fwd to writeup!

7:09am November 13th 2013 via Falcon Pro

RT @dragosr: PacSec pwn2own mobile: 2 winners so far. Pwned: iPhone, Galaxy S4. iPhone pwned by .cn team, Samsung by .jp team.

7:06am November 13th 2013 via Falcon Pro

RT @TomRittervg: And TrustZone makes three. RT @newsycombinator: The second operating system hiding in every mobile phone http://t.co/A7qvBxxtjC

7:03am November 13th 2013 via Falcon Pro

RT @thezdi: The Japanese team have succeeded against a Samsung Galaxy S4 running Android 4.3. They exploited the browser to exfiltrate data. #pwn2own

6:51am November 13th 2013 via Falcon Pro

RT @thezdi: Welcome to Mobile Pwn2Own at PacSec Tokyo - Super, happy fun #pwn2own #pacsecjp http://t.co/U02ubpkLeq

6:51am November 13th 2013 via Falcon Pro

RT @taviso: If you connect a BlackBerry to a Mac/Windows machine, that machine is vulnerable to RCE http://t.co/nt4VDfmpYO CVE-2013-3694

4:32pm November 12th 2013 via Falcon Pro

RT @trufae: Wrap text with vim: :set textwidth=78 V gq #vimtip

11:07am November 12th 2013 via Falcon Pro

Easily Instrumenting Android Applications for Security Purposes - [PDF] http://t.co/LqYbDZFj2U

8:43am November 12th 2013 via web

BootUnlocker for Nexus Devices updated, now supports Nexus5 - http://t.co/RZpnwZiXmy

2:20pm November 11th 2013 via Falcon Pro

RT @theKos: Toorcon talk is up. Toorcon 2013 Multiplexed Wired Attack Surfaces - @MichaelOssmann & Kos: http://t.co/5fbn2fv4RB

11:38am November 11th 2013 via Twitter Web Client

@adumont @TeamAndIRC @djrbliss i'd send the poc to them along with instructions and a deadline to fix, if not fixed on time go public disc.

10:35am November 11th 2013 via Falcon Pro in reply to adumont

RT @radareorg: In other words, if you don't speak sha256. There's a new release of r2, and those checksums may be used to verify they are the correct ones.

12:33am November 11th 2013 via Falcon Pro

RT @chipzel: Very happy to announce that I’ll be doing the full OST for INTERSTELLARIA. The Kickstarter was launched today :D http://t.co/VoalDF2rw5

5:45pm November 10th 2013 via Falcon Pro

The Impact of Vendor Customizations on Android Security - [PDF] http://t.co/3CSOMwdq27

10:42am November 10th 2013 via web

RT @virusbtn: Interesting post on the new security features in Android KitKat by @CERT_Polska_EN http://t.co/ndLHSq0wxZ

7:56pm November 9th 2013 via Falcon Pro

@shawnvalle i always prefer Nexus, although GS4 GPe is a very good piece of hardware, still not comparable to a Nexus in terms of sw update

2:41pm November 9th 2013 via Falcon Pro in reply to shawnvalle

veritysetup command source, this one seems to be the crux of the matter to enable dm-verity on custom AOSP builds - http://t.co/o9q1s9h6T6

1:22pm November 9th 2013 via web

and here's dm-verity kernel Doc from the nexus5 tree (not much diff from the chromebook though) - https://t.co/hnSE2tJkML

1:09pm November 9th 2013 via web

found the #nexus5 #hammerhead kernel, it's a branch inside the msm repo (android-msm-hammerhead-3.4-kk-r1) - https://t.co/2CIoaux3FA thx ius

1:05pm November 9th 2013 via web

still no kernel sources for #nexus5 #hammerhead?

10:41am November 9th 2013 via web

@zl0w_ és un Màster en Internet Business que està fent ara l'@apuigsech (jo el veure al mòdul de tecnología) +info: http://t.co/FXZsLehgGm

9:49am November 9th 2013 via Falcon Pro in reply to zl0w_

still struggling to understand how to add dm-verity into a custom AOSP build :/ cc @thegrugq

9:31am November 9th 2013 via web

and here's the dm-verity documentation in the kernel's src - https://t.co/CM2AtJGcHq & https://t.co/WprlhSB2iy

9:30am November 9th 2013 via web

This is the commit that adds dm-verity support to android's fs manager - https://t.co/XfXmBbz2LS here's the src https://t.co/cUTXZuzBYS

9:26am November 9th 2013 via web

RT @thegrugq: Burner SIM cards for burner phones. http://t.co/0AUnHoSWYN

7:09am November 9th 2013 via Falcon Pro

@thegrugq i will, still working on it... :P

7:09am November 9th 2013 via Falcon Pro in reply to thegrugq

Story about static analysis of 15k mobile Apps - http://t.co/t21BBBJMDJ (via @abelenko)

7:21pm November 8th 2013 via web

Patching an Android Application to Bypass Custom Certificate Validation - http://t.co/iLlPs0bHc6

11:41am November 8th 2013 via web

How To Triple Boot Nexus 4 On Android, Firefox OS & Ubuntu Touch - http://t.co/u8mcK2Th7z

10:57am November 8th 2013 via web

RT @JonathanSalwan: Multiple memory corruption & race condition in Goodix gt915 Android touchscreen driver (CVE-2013-4740 CVE-2013-6122) https://t.co/jhVayr

10:46am November 8th 2013 via Falcon Pro

RT @volkerdi: New stable #Slackware 14.1 release is available now! Thanks to everyone who helped out this time around. :) http://t.co/n6JeRsqWKB

9:50am November 8th 2013 via Falcon Pro

RT @karimyaghmour: About that support for low-memory devices in 4.4 ... : https://t.co/5AvO93WCQD

11:48pm November 7th 2013 via Falcon Pro

Android 3.4 kernel dm-verity module source (based on Chromium dm-verity driver) - https://t.co/WIe2PiOsbM

5:59pm November 7th 2013 via web

dm-verity: device-mapper block integrity checking target, article featured on cryptsetup wiki - https://t.co/eBGlg37rCZ

5:54pm November 7th 2013 via web

dm-verity presentation from LSS'11 (focusing on chromebook): Integrity-checked block devices with device mapper - http://t.co/yNJjOvdQCc

5:52pm November 7th 2013 via web

RT @tracer0tong: @hgascon @pof some weeks ago I made a presentation about using ML for #android malware detection. http://t.co/0m5ToV6Zqo it's trend theme :)

4:36pm November 7th 2013 via Falcon Pro

RT @guardianproject: Mobile Secuirty Open Office Hours Tmrw @ 10am EST / 3pm UTC - IRC #guardianproject / Hangout OnAir: https://t.co/ZoqwVIPat5

4:00pm November 7th 2013 via Falcon Pro

RT @hgascon: Our paper on detection and analysis of #android #malware using structural learning is up here -> http://t.co/qNmsBtKVzo #AISEC #CCS2013

2:36pm November 7th 2013 via Falcon Pro

RT @xdadevelopers: Exit the Chromecast Walled Garden with KyoCast http://t.co/ogI7bt9Qed

12:52pm November 7th 2013 via Falcon Pro

so far only found a couple of apps that break because of switching to ART runtime: WhatsApp and DrawSomething

12:18pm November 7th 2013 via web

@xuf_ @0xroot a mi em funcionen be amb chromium/linux. Estàn allotjats a vimeo.

11:15am November 7th 2013 via web in reply to xuf_

smali / backsmali downloads are now hosted on bitbucket - https://t.co/CIhEAT86y7

10:51am November 7th 2013 via web

RT @markog: No other technology in history grew as fast as Android: http://t.co/3ChBGmMpAW

2:45am November 7th 2013 via Falcon Pro

oat2dex.sh, a script to extract DEX files from Android Runtime OAT files using #radare2 - https://t.co/3YxB9mBM3i

2:20am November 7th 2013 via web

Android Runtime (ART) OAT to DEX using radare2 http://t.co/76coWqR9iF

1:27am November 7th 2013 via web

RT @TeamAndIRC: Dont stress on ART OAT files, they contain a full dex -> https://t.co/7W78IkVOQY

12:15am November 7th 2013 via Twitter Web Client

RT @cryptopathe: @rsinha @pof Presentation of #CCS2013 paper "An Empirical Study of Cryptographic Misuse in Android Applications", cf. http://t.co/o6I1PkobyP

10:34pm November 6th 2013 via Falcon Pro

RT @AndroidPolice: Meet ART, Part 1: The New Super-Fast Android Runtime Google Has Been Working On In Secret For Over 2 Years Debuts... http://t.co/7AcMaEkvDL

10:30pm November 6th 2013 via Falcon Pro

@mncoppola a RAT to control infected device would be nice for demos :)

9:17pm November 6th 2013 via Falcon Pro in reply to mncoppola

RT @mncoppola: Let's try this crowdsourcing thing. What features do you want to see in Suterusu rootkit next?

9:15pm November 6th 2013 via Falcon Pro

RT @AndroidPolice: PSA: The Latest Google Play Services Update May Disable Android Device Manager (Remote Location And Wipe) In... http://t.co/Sw0n3H1Nz6

3:11pm November 6th 2013 via Falcon Pro

RT @cryptopathe: The sad state of the crypto in Android apps summarized on a single slide #ccs2013 http://t.co/FcVxU3CAtn

3:06pm November 6th 2013 via Falcon Pro

@saidelike nope, pin/password is mandatory for encrypted devices

2:50pm November 6th 2013 via Falcon Pro in reply to saidelike

#Nexus5 default SELinux policy 42 Permissives - http://t.co/6M2UaBaPop

12:05pm November 6th 2013 via web

Nice, free code signing certficiates for open source projects - https://t.co/QrdaPSTCuQ

10:16am November 6th 2013 via TweetDeck

xposed framework doesn't work on Android 4.4 (yet) - http://t.co/khtDZem11E

7:44pm November 5th 2013 via web

@minid settings -> about phone -> system updates

12:20pm November 5th 2013 via Falcon Pro in reply to minid

RT @jduck: In which I state the obvious, bow my head in shame, and cheer all at once - Android 4.4 and Chrome WebViews - https://t.co/86kdXenigZ

9:13am November 5th 2013 via Falcon Pro

This is the patch in 4.4 for the new MasterKey bug (9950697) by @saurik - https://t.co/MiCdZAYN3S

8:33am November 5th 2013 via web

RT @YJesus: Eavesdropping near-field contactless payments: a quantitative analysis http://t.co/ulgI0nzzax

1:29pm November 4th 2013 via Twitter Web Client

Android NDK "crazy linker", didn't know that this existed - https://t.co/3gNiDLQqGA

12:22pm November 4th 2013 via web

Introspy: Security Profiling for Blackbox iOS and Android - [PDF] http://t.co/yFMA4HU2mT

11:54am November 4th 2013 via web

Anti-TaintDroid (a.k.a. ScrubDroid) - Escaping Taint Analysis (and stealing private information) on Android - [PDF] http://t.co/qZLjhg6jcX

11:53am November 4th 2013 via web

RT @jduck: If you've had trouble like I have with ndk-gdb and JDK7, see https://t.co/EndSkQqmgf

11:03am November 4th 2013 via Falcon Pro

@GNF_es se puede hacer algo para denunciar esto? http://t.co/bPzB5UTVKm

8:10am November 4th 2013 via web

@thegrugq haven't checked this in depth yet, will spend some cycles with this next week, will let u know when i know it better

7:33pm November 3rd 2013 via Falcon Pro in reply to thegrugq

dm-verity on boot | Android Developers - http://t.co/Z4gWvdV3hL

6:12pm November 3rd 2013 via Falcon Pro

Security Enhancements in Android 4.4 | Android Developers - http://t.co/3GhdeyU80J

6:11pm November 3rd 2013 via Falcon Pro

RT @newsycombinator: Google Taking Aim at Device Modders in Android 4.4 KitKat http://t.co/vJK4GK8Otq

6:10pm November 3rd 2013 via Falcon Pro

RT @PaulOBrien: Sounds like us outside the US could still be getting Google Voice if I'm reading this right! https://t.co/l1HkJk1zui

6:03pm November 3rd 2013 via Falcon Pro

@bartblaze @StErMi @TeamAndIRC yeah it happens with some packers specially on Windows, but I haven't seen this happen with any Android app

5:57pm November 3rd 2013 via Falcon Pro in reply to bartblaze

@StErMi @TeamAndIRC it's using Dexguard, a commercial packer, to difficult RE

11:14am November 3rd 2013 via Falcon Pro in reply to StErMi

RT @jduck: Seems there is no Android 4.4 CDD yet. I guess everyone is free to do whatever they want!

8:46am November 3rd 2013 via Falcon Pro

RT @TeamAndIRC: RockMyMoto (Root for OTA'd MotoX) is now available on XDA http://t.co/fVv7gt7Lyk

8:43am November 3rd 2013 via Falcon Pro

RT @jduck: I created a custom mirror manifest for those of you who mirror AOSP. Seems the new AOSP guy is slacking or lost. https://t.co/9K3vn9lYOf

6:36am November 3rd 2013 via Falcon Pro

RT @Fuzion24: https://t.co/42qXwfiH7x Names a list of zip bugs fixed in 4.4 ...

10:43pm November 2nd 2013 via Falcon Pro

RT @a0rtega: I've just uploaded the slides of my presentation "Keep your sandbox for malware analysis unnoticed" #ncn2k13 #malware http://t.co/dKUkzEdNus

9:22pm November 2nd 2013 via Falcon Pro

RT @xdadevelopers: Android 4.4 Security Enhancements http://t.co/l4HO2hIjEt

7:13pm November 2nd 2013 via Falcon Pro

@NuShrike yeah, let's see how that evolves on future versions of Android and the adoption it will have, but is going in the right direction

11:27am November 2nd 2013 via Falcon Pro in reply to NuShrike

@Marccoga iep si! a veure si ens veiem aviat que ara em toca a mi invitar al ideal ;) /cc @interferencies @iolandatweets

11:00am November 2nd 2013 via Falcon Pro in reply to Marccoga

This article has great comments -with links- on the new ART runtime and OAT file format - https://t.co/B1QqUyndlp (via @trufae)

10:04am November 2nd 2013 via web

Debbugers are really powerful: Pwning all of the Android things (EN) - [PDF] http://t.co/11bRuIbGrO (video) http://t.co/DXPQwvk8Cx

9:28am November 2nd 2013 via web

Modification to the Android operating system´s resource control (ES) - [ZIP] http://t.co/7eJDilrQbX (video) http://t.co/tGfOWcVjYn

9:27am November 2nd 2013 via web

Droid Rage: Android exploitation on steroids (ES) - [PDF] http://t.co/Nq61P0IxlL (video) http://t.co/kpaJ9m83Ha

9:27am November 2nd 2013 via web

Yet Another Android Master Key Bug by Jay Freeman (@saurik) - http://t.co/p33acPb8wn

8:06am November 2nd 2013 via Falcon Pro

Sebastián @0xroot presenting userland rootkits on Android #ncn2k13 http://t.co/XvBFfY8vUl

6:54pm November 1st 2013 via Falcon Pro

RT @javutin: Thanks to the participants of #ncn2k13 #CTF, congrats to festucs! /cc @apuigsech @whatsbcn @samsa2k8 @apuigventos http://t.co/O1PA039JaH

5:52pm November 1st 2013 via Falcon Pro

Sebastián @0xroot presenting userland rootkits on Android #ncn2k13 http://t.co/eehaz0UGQU

5:33pm November 1st 2013 via Falcon Pro

RT @rchiossi: The source code for Android 4.4 is up in AndroidXRef. Check it out at http://t.co/HlUL97xy3z

5:30pm November 1st 2013 via Falcon Pro

new runtime == bigger attack surface :) RT @madCdan Introduction ART in #Android : http://t.co/Drlv67sMXD

4:52pm November 1st 2013 via Falcon Pro

RT @noconname: 1st position, winners : festucs @ #ctf_ncn2k13 #ncn2k13 congratulations!!! http://t.co/U23zSIn9Ru

4:36pm November 1st 2013 via Falcon Pro

RT @alsutton: So "phantasm" "Wolfie" "arndale" and "anchovy"... New devices? https://t.co/7jukdRpjOp

2:21pm November 1st 2013 via Falcon Pro

RT @alsutton: Be aware folks; there's a North American #Nexus5 and a "Rest of world" #Nexus5. Differences are LTE bands supported & CDMA support

2:20pm November 1st 2013 via Falcon Pro

RT @raviborgaonkar: "@b_erb: OH: »Let's replace Alice &amp; Bob with Angela &amp; Barack for our security examples.«"

2:07pm November 1st 2013 via Falcon Pro

RT @alsutton: #AOSP #KitKat #Changelog This isn't to the release on the #Nexus5 (KRT16M) this is from 4.3_r2_1 (JSS15J) to KRT16D. http://t.co/vcv0ADtyL9

10:19am November 1st 2013 via Falcon Pro

RT @alsutton: Looks like 4.4 was forked just prior to 4.3_r3 (JLS36B), after which it became KRS44B. #AOSP #Releases

10:16am November 1st 2013 via Falcon Pro

today is my 1st anniversary at @viaForensics, working with an awesome team! :)

10:12am November 1st 2013 via Falcon Pro