Tweets from August 2014

RT @thuxnder: I finally kick started my Android device inventory. Check out and contribute. Need API to query for data, ping me! http://t.co/sBkZ323VRm

8:40pm August 31st 2014 via Falcon Pro

RT @collinrm: August is almost over, here my mobile security update: http://t.co/sTJZYbaufn

8:39pm August 31st 2014 via Falcon Pro

RT @suka_hiroaki: Banning disconnect.me from the Play Store? Not ok, Google. Not ok at all. #privacy https://t.co/c4PKPvbhuR

8:39pm August 31st 2014 via Falcon Pro

RT @jduck: I'm trying to gauge interest in training based roughly on Android Hacker's Handbook. email ahhtraining at qoop dot org if interested

8:38pm August 31st 2014 via Falcon Pro

RT @reyammer: Our BADGERS'14 paper on Andrubis (and 1M+ analyzed Android apps) is now online! http://t.co/GXurUqfX0m

8:28pm August 31st 2014 via Falcon Pro

RT @kutyacica: We have launched the new Qualcomm product security page https://t.co/kDGHwfFzeV clarified process, pgp key and a Hall-of-Fame. h/t @iamnion

6:20pm August 28th 2014 via Falcon Pro

RT @AndroidTamer: Good writeup on reducing size of Android Apps and good tips on resource optimisation and dexguard config. : https://t.co/oE1IVP3JbW

6:18pm August 28th 2014 via Falcon Pro

@ThE___MaTrIx sorry no idea, i've always used dm-crypt & LUKS on Linux.

6:16pm August 28th 2014 via Falcon Pro in reply to ThE___MaTrIx

Sneak peek of the new "Block Everything" feature for my #StreetFighter 2 Turbo MAME training mode cheat - http://t.co/bT1ILfVy8m

11:35am August 28th 2014 via Twitter Web Client

RT @chrlyblck: 'Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks' --> video http://t.co/BhH81aXNhs

6:28am August 28th 2014 via Falcon Pro

RT @Mobile_Sec: Solution for the WebView based apps that are requesting tons of permissions: [PAPER] NativeWrap http://t.co/ANvXImSId2

6:35am August 27th 2014 via Falcon Pro

RT @0xroot: A deep dive into DEX file format - http://t.co/gLPhm6umHG

6:29am August 27th 2014 via Falcon Pro

RT @claud_xiao: Someone has ported Xposed to ART and will demosrtate it at HelloGCC 2014: http://t.co/rELjKQ7bKW Not sure he will open it or not.

7:58am August 26th 2014 via Falcon Pro

RT @insitusec: Develop / run ARMv7 binaries in a #docker container with QEMU chroot on your x86 system https://t.co/GjGsQMJsgU

7:51am August 26th 2014 via Falcon Pro

@djrbliss Tekken 3? Playstation?? that's too mainstream, go play Super Turbo on a CPS2 - http://t.co/8J4c6bct14

12:06pm August 25th 2014 via Falcon Pro in reply to djrbliss

RT @koush: I'm in your Chrome running an ADB server: https://t.co/Z48A223S21

11:36am August 25th 2014 via Falcon Pro

RT @gtvhacker: Here are the files for the new Chromecast Root Exploit, #HubCap. http://t.co/uN6JTl3xtv @Dev_Team_Eureka @fail0verflow #HackAllTheThings

11:30am August 25th 2014 via Falcon Pro

RT @carlosacastillo: [PDF] Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks http://t.co/J8YBap7eeT

11:30am August 25th 2014 via Falcon Pro

@focusattack yeah I put sanwa OBSF-30 buttons and a JLF-TP-8Y stick (no metal plate), otherwise the thing is totally unusable, lol.

5:42am August 25th 2014 via Falcon Pro in reply to focusattack

@focusattack is ok for casual games, but does not feel solid enough for serious play. Is nice for travel though :)

12:45am August 25th 2014 via Falcon Pro in reply to focusattack

RT @Mobile_Sec: Debugging Android APKs with Eclipse and DDMS http://t.co/g0DhjYbVMz by @victordorneanu

3:50pm August 22nd 2014 via Falcon Pro

RT @atrox_at: "IMSI Catch me if you can" preprint of our ACSAC paper about detecting IMSI Catchers http://t.co/Q4hANoGMfL @iamnion @raviborgaonkar @Fr333k

3:49pm August 22nd 2014 via Falcon Pro

RT @Mobile_Sec: Did you hear @sansforensics 's #DFIR Smartphone Forensics & Smartphone Malware Challenge: https://t.co/nliVaYksW8

3:47pm August 22nd 2014 via Falcon Pro

RT @jduck: PS. It can also be used to persist root access across an OTA update ;-)

8:06am August 22nd 2014 via Falcon Pro

RT @jduck: I have discovered a vulnerability that fits @TeamAndIRC's "Bug #3" in the @Blackphone_ch firmware. What contact method is preferred?

8:06am August 22nd 2014 via Falcon Pro

RT @TeamAndIRC: StumpRoot has a new bruteforcer, now takes just a couple minutes instead of hours, and roots most LGs from 2012-2014 http://t.co/m7VpNGXwlK

8:00am August 22nd 2014 via Falcon Pro

RT @thomas_cannon: Samsung Android Encryption implementation details (from @DerbyCon Sep '13) http://t.co/QkJBu4YUXl [PDF]

8:00am August 22nd 2014 via Falcon Pro

RT @DepletionMode: @iamnion early_random does provide effective mitigation however is not active on many devices e.g. End-to-end trivial attack GS4 PoC

7:58am August 22nd 2014 via Falcon Pro

RT @iamnion: disappointed by #woot14 authors of Attacking the Linux PRNG on Android paper https://t.co/Rmu3YhwC7M vs http://t.co/sNiHapS5jz

7:57am August 22nd 2014 via Falcon Pro

RT @anestisb: Have ported melkor ELF fuzzer to Android. Initial output seems quite promising target ART apps | https://t.co/zBhpbA3Wae /cc @nitr0usmx

7:55am August 22nd 2014 via Falcon Pro

RT @0xroot: Lightly poking Dalvik with a stick - http://t.co/r5ttz6oVqu

7:36am August 22nd 2014 via Falcon Pro

RT @Mobile_Sec: "Vaccinating Android" talk at @BSidesLV from @MilanGabor & @alm8i http://t.co/F1gma7RiUp Vaccine tool look so good: https://t.co/YatgBCc81J

4:43pm August 19th 2014 via Falcon Pro

RT @claud_xiao: My presentation "Insecure Internal Storage in Android" at HITCON slides and PoC codes: https://t.co/VWhTGKdacK

4:42pm August 19th 2014 via Falcon Pro

RT @Fuzion24: Slides from @TeamAndIRC's Android exploitation training at Blackhat 2014 https://t.co/JrNrBHx38p there's some fun stuff in there.

4:33am August 19th 2014 via Falcon Pro

RT @McGrewSecurity: This guy reverse engineers and reimplements old Sega arcade games like OutRun and it's pretty fascinating http://t.co/tmHo2h5Bp8

9:30pm August 18th 2014 via Falcon Pro

RT @raviborgaonkar: Me n @swapnil_udar released the Android app for detecting silent SMS/cellular operators 2G/3G security capabilities https://t.co/hH0YQkSck5

9:23pm August 18th 2014 via Falcon Pro

RT @cryptax: Back from holidays: blog post on #Alligator finding another #riskware: http://t.co/sfqZKJ2jJV #automatic #discovery #Android #china

9:19pm August 18th 2014 via Falcon Pro

RT @Mobile_Sec: Nmap is cross compiled for Android https://t.co/AkJzi1fHsZ

9:16pm August 18th 2014 via Falcon Pro

RT @TeamAndIRC: Hey @Azureflux_ thanks for the tunes! We took one of your CC licensed ones for our LGG3 root http://t.co/BbNdtH8cy8

11:27pm August 17th 2014 via Falcon Pro

RT @TeamAndIRC: @pof yeah i finally added chiptunes to a root lol

11:26pm August 17th 2014 via Falcon Pro

RT @TeamAndIRC: StumpRoot - Sprint/AT&T/Verizon/TMobile LGG3 Root http://t.co/BbNdtH8cy8

11:26pm August 17th 2014 via Falcon Pro

RT @gtvhacker: New Chromecast Root Method Incoming! Collaboration of @gtvhacker, @fail0verflow & @Dev_Team_Eureka: http://t.co/3KPts9NuZW #hackallthethings

9:32pm August 17th 2014 via Falcon Pro

RT @Fuzion24: A quick bit on building Xposed modules using Gradle without modifying the Android SDK: http://t.co/3Mngc74eMA

9:30pm August 17th 2014 via Falcon Pro

RT @oleavr: Say hello to CryptoShark – an open source cross-platform interactive debugger powered by Frida and @capstone_engine: https://t.co/LZp1IcHaEw

9:30pm August 17th 2014 via Falcon Pro

RT @timstrazz: Well then. Brace yourself for Dendroid clones #android #malware https://t.co/6ekQZKXEq3

10:41am August 16th 2014 via Falcon Pro

RT @timstrazz: #Android IDA Pro-tip: Fixed dbg_dalvik.cfg - better timeouts and pointing to normal adb location https://t.co/lp193uX9XN

10:13am August 15th 2014 via Falcon Pro

RT @gtvhacker: For all those looking to #HackAllTheThings, the slides from our @_DEFCON_ presentation can be found at http://t.co/CW0g1qYBjU #DEFCON22

6:18pm August 14th 2014 via Falcon Pro

RT @ashk4n: Remote Android/iPhone screen unlock and jailbreak using NIA/OTA - One of the more troubling #Blackhat talks this year http://t.co/0dUwtUcxkk

6:12pm August 14th 2014 via Falcon Pro

fb-adb: A better shell for Android devices (binary clean, updates window size, dif stdout/stderr, pty allocation) - https://t.co/hb2hXaf37J

5:55am August 13th 2014 via Twitter Web Client

RT @mod0: BlackBerry Z 10 - Storage and Access File-Exchange Authentication By-Pass [MZ-13-04] http://t.co/E8UJTRIEwP #blackberry #security

6:13pm August 12th 2014 via Falcon Pro

RT @j4istal: The slides from my #BlackHat2014 talk on #Android #FakeID, and some follow-up info, are now online: https://t.co/CVR33ZKCUX

5:08pm August 12th 2014 via Falcon Pro

RT @alsutton: .@Blackphone_ch have made a second post about @TeamAndIRC's findings: http://t.co/B9UnVE3HnG . Rather than fix things they disabled adb :(

1:49pm August 12th 2014 via Falcon Pro

RT @kana_09_07: ダルシムのヘッドフォンかっこいい! http://t.co/sHMJMPS8q2

5:55pm August 11th 2014 via Falcon Pro

RT @kapitanpetko: Quick-n-dirty certificate chain generator in Java, compatible with most Android versions https://t.co/2HzN4zJAXj

8:42am August 11th 2014 via Twitter Web Client

RT @yigitboyar: android backstage talk: Art GC http://t.co/HfwWQxgrbZ you may also hear other good news :)

6:48am August 11th 2014 via Falcon Pro

RT @timstrazz: Slides and POC unpacker code published on github from @TeamAndIRC and my talk from @_defcon_ today https://t.co/AE8muLq5Eh

6:37am August 11th 2014 via Falcon Pro

RT @TeamAndIRC: Blackphone hack2: remotewipe app runs as system, and is debuggable, attach debugger get free system shell

6:35am August 11th 2014 via Falcon Pro

RT @TeamAndIRC: Black phone hack #1, USB debugging/dev menu removed, open via targeted intent

6:35am August 11th 2014 via Falcon Pro

RT @0xroot: [Slides] Android Packers - Separating from the pack http://t.co/WlAK8IoYge

5:56am August 11th 2014 via Twitter Web Client

RT @timstrazz: .@TeamAndIRC is killing it, and by it I mean obfuscators, at @_Defcon_ right now http://t.co/soVIfQil0I

9:36pm August 10th 2014 via Falcon Pro

RT @singe: MANA is live at https://t.co/BTN5IN5N6k Our toolkit for rogue ap & MitM attacks @iandvl and I just presented @_defcon_ 22

9:34pm August 10th 2014 via Falcon Pro

RT @gtvhacker: Our wiki of our findings from our @_defcon_ presentation is now live. Check it out at http://t.co/tGg7gwkUZc #HackAllTheThings

9:14pm August 10th 2014 via Falcon Pro

RT @TeamAndIRC: Boom escalation to system on the @blackphone_ch with @timstrazz , root in 5 minutes

9:13pm August 10th 2014 via Falcon Pro

RT @TeamAndIRC: hey @Blackphone_ch look, adb enabled without unlocking your bootloader http://t.co/fVa6dTHR6g

9:13pm August 10th 2014 via Falcon Pro

RT @Thu_Duo: Jeff Forristal demos the android fake ID vulnerability - phishing email > malicious data-stealing app #BHUSA @duosec http://t.co/uUhU0IlINg

5:57pm August 9th 2014 via Falcon Pro

RT @DidierStevens: Use mailinator with your own domain: create a MX record to http://t.co/Gt0n3JfEdO

5:55pm August 9th 2014 via Falcon Pro

RT @Fuzion24: QSEE TrustZone Kernel Integer Overflow Vulnerability https://t.co/Pl12gqCOn6 by @djrbliss

12:56pm August 9th 2014 via Falcon Pro

RT @XipiterSec: Android Hacker’s Handbook book signing at @BlackHatEvents with @s7ephen @collinrm @quine @jduck #bhusa http://t.co/zJ41S4PHyH

12:29pm August 9th 2014 via Falcon Pro

RT @djrbliss: LG and Samsung devices cannot be bootloader unlocked via TrustZone, so please stop asking me about it.

11:34am August 9th 2014 via Falcon Pro

RT @mikko: We confirmed that the Xiaomi Android phone does silently send your data to a server in China: http://t.co/jbptFW2uC2 http://t.co/jz1QMfFZ4W

1:24pm August 8th 2014 via Twitter Web Client

RT @0xroot: Attacking mobile broadband modems like a criminal would - http://t.co/Evklru7R1A

3:19pm August 7th 2014 via Falcon Pro

RT @esizkur: Here's @Reversity's slide deck on a novel way to break WPS (Offline Bruteforce Attack on Wifi Protected Setup): http://t.co/N4ZLUGmAEP

3:12pm August 7th 2014 via Falcon Pro

RT @TeamAndIRC: .@djrbliss just unlocked the motox on stage, nice bug

3:10pm August 7th 2014 via Falcon Pro

RT @Dinosn: Android Dynamic Code Analysis - Mastering DroidBox http://t.co/AORlSIqwuE

1:55pm August 7th 2014 via Falcon Pro

@WileyTech @jduck @s7ephen @collinrm not me.. it will be @quine instead. @ochsff and me will be missing it.

8:37pm August 6th 2014 via Falcon Pro in reply to WileyTech

Fastboot boot command bypasses signature verification (CVE-2014-4325) - https://t.co/vuIXX2xfgg

6:24am August 6th 2014 via Twitter Web Client

RT @kapitanpetko: Reverse Engineering Android's Aboot http://t.co/iqyGAtrZGq

8:37am August 5th 2014 via Twitter Web Client

RT @carlosacastillo: [PDF] Obfuscation in Android malware and how to fight back http://t.co/9EAWoY1wRJ - Pro and Dex Guard, APK Protect, HoseDex2Jar and Bangcle

6:51am August 5th 2014 via Falcon Pro

Apache Cordova Vulnerability Discovered: 10% Android Banking Apps Potentially Vulnerable - http://t.co/ictpnBEHd1 & http://t.co/v8Wr0MOVvz

5:54am August 5th 2014 via Twitter Web Client

RT @binitamshah: Cloning Credit Cards: Combined pre-play & downgrade attack on EMV Contactless: http://t.co/wZLIS7l61g, EMVemulator : http://t.co/r0VI54Q8N8

7:43pm August 4th 2014 via Falcon Pro

RT @Fuzion24: POC for the Android FakeID Bug 13678484 : https://t.co/4vEdAFV7R5

7:40pm August 4th 2014 via Falcon Pro

RT @jduck: Our signing at @_defcon_ will be Fri Aug 8 at 12pm at the @nostarch community table. More information here: http://t.co/J4rKqkUkHR

8:34pm August 3rd 2014 via Falcon Pro

RT @jduck: Bring your Android Hacker's Handbook next week! @collinrm @quine @s7ephen and I will be signing books at @BlackHatEvents and @_defcon_ !!

8:33pm August 3rd 2014 via Falcon Pro

EMVemulator: Android app to collect and emulate Mag-Stripe data and CVC3 codes from PayPass cards - https://t.co/oKNqg4JRF6 via @theKos

8:15pm August 3rd 2014 via Falcon Pro

@Joker_Alee download Santoku Linux, it has everything you need :)

7:31pm August 3rd 2014 via Falcon Pro in reply to Joker_Alee

RT @radareorg: Ascii Art basic block graphs working on Android with capstone disassembler http://t.co/nUWzMCNnzL

8:26am August 2nd 2014 via Falcon Pro

RT @Fuzion24: Local DOS: Reboot Nexus5 with 0 permissions : Patched in Android 4.4.4 https://t.co/3MdkgLXL9F

8:25am August 2nd 2014 via Falcon Pro

FakeIDFix: Xposed patch for Android bug 13678484 - https://t.co/e61NNzUO5u

8:15am August 2nd 2014 via Falcon Pro

RT @Fuzion24: Remotely debugging Android apps with IDA: http://t.co/vV86suL3iC

6:40am August 1st 2014 via Falcon Pro

RT @WeldPond: Android IMSI-Catcher Detector (AIMSICD) Detect and avoid IMSI-Catcher attacks! http://t.co/UODQX0y7ZZ

6:28am August 1st 2014 via Falcon Pro