Tweets from November 2014

@CamiJunST all neogeo games or just svc chaos?

11:33pm November 29th 2014 via Falcon Pro in reply to CamiJunST

RT @ChainfireXDA: Goodbye ACCESS_SUPERUSER permission? https://t.co/167T0n33YK

6:42pm November 27th 2014 via Falcon Pro

@Mattun_Ken haha! Yogaboy is the best Blanka... wins MAO in championship :P

4:55pm November 26th 2014 via Twitter Web Client in reply to Mattun_Ken

RT @kapitanpetko: 64-bit ARM OS/Kernel/Systems Development Demo on a Nexus 9 http://t.co/IY41OISJ4t

12:07pm November 25th 2014 via Falcon Pro

RT @esizkur: Good news! Apparently an official DynamoRIO port for ARM is in the works: https://t.co/OQABlINh1G (https://t.co/j3pY5xxTNQ)

12:02pm November 25th 2014 via Falcon Pro

RT @Fuzion24: Open Bump: https://t.co/YspY8ehif4 use LG's bootloader backdoor to boot improperly signed images

11:57am November 25th 2014 via Falcon Pro

@Jack04311910 hopefully all runs smoothly now :-) thanks for reporting issues!

1:56pm November 24th 2014 via Falcon Pro in reply to Jack04311910

PoC source code of Android Bug 17356824 (broadAnyWhere) - https://t.co/aloJjp1KjS

12:44am November 24th 2014 via Falcon Pro

RT @collinrm: Mobile Security News Update Nov 2014 http://t.co/90yyUlEmkF Very Android heavy!

12:40am November 24th 2014 via Falcon Pro

RT @andremoulu: The exploit for the Samsung Knox smdm vulnerability is now available in metasploit (with APK autorun after install) https://t.co/9AWkyXnUXb

12:30am November 24th 2014 via Falcon Pro

RT @TeamAndIRC: dont run the new kindle firetv ramdisk on the old hackable bootloaders, it will blow a qfuse and @#$% up the box

12:27am November 24th 2014 via Falcon Pro

RT @viaforensics: viaLab 3.2 released! https://t.co/38RO8d4A1W &don't forget to take a look at the community edition: https://t.co/9CTYst1I0g #mobilesecurit

8:47pm November 21st 2014 via Falcon Pro

RT @todb: Here's the weekly @metasploit wrapup, featuring another Android-based module from @joevennix and @jduck https://t.co/U97ADwhkrr

8:45pm November 21st 2014 via Falcon Pro

RT @timstrazz: NotCompatible.C #Android #Maleare samples available via ContagioMiniDump http://t.co/cr9b3GomFp

8:37pm November 21st 2014 via Falcon Pro

@arkadeum cool! let me know if you want the @fightcade replay id's of the matches for later replay footage

10:21am November 21st 2014 via Falcon Pro in reply to arkadeum

RT @jduck: @ChainfireXDA you don't even change the actual kernel. it's a boot image. it contains a ramdisk and a kernel. rd contains root fs, init rcs

7:33am November 21st 2014 via Falcon Pro

RT @AndroidPolice: AnandTech Posts Side-By-Side NAND Performance For Nexus 6 Encrypted Vs. Unencrypted - It's Not Pretty http://t.co/VFHVBOkd6n

7:28am November 21st 2014 via Falcon Pro

RT @AndroidTamer: DoubleDirect – Zimperium Discovers Full-Duplex ICMP Redirect Attacks in the Wild : http://t.co/D5KAGSepJM by @ZIMPERIUM team

7:21am November 21st 2014 via Falcon Pro

RT @opalesecurity: Very Interesting Slides and Research on PLC plug (in)security #NSC14 : IMHO Great Job ! http://t.co/5BaaXHk76j

7:14am November 21st 2014 via Falcon Pro

RT @julianor: reprogram 4G modems via SMS, make them act as keyboard -> reboot -> act as storage -> install bootkit. 8-o http://t.co/mcnj0WOLHU

7:08am November 21st 2014 via Falcon Pro

RT @Gunther_AR: NotCompatible - Interesting blog entry by @timstrazz https://t.co/Xjly7fMH9d

7:07am November 21st 2014 via Falcon Pro

RT @vlad902: Check out @thuxnder 's Android device info website, lots of data and some neat visualizations: http://t.co/clClwR4ZrH

7:02am November 21st 2014 via Falcon Pro

RT @carlosacastillo: The upcoming Jack & Jill compilers in Android http://t.co/cDUWRntJ6e. Java code -> Jack compiler -> Dalvik bytecode (.dex) ProGua

6:57am November 21st 2014 via Falcon Pro

RT @alsutton: Looks like the cause of signing issues in #Lollipop has been found - https://t.co/GIjYDE4lsr https://t.co/Fg9uJ2FXlk

6:52am November 21st 2014 via Falcon Pro

RT @exploitdb: [remote] - Samsung Galaxy KNOX Android Browser RCE: Samsung Galaxy KNOX Android Browser RCE http://t.co/tnHn0fPhVK

6:47am November 21st 2014 via Falcon Pro

@testosticore nice! don't feel sorry at all, I made those a few years ago, surprised you still find them useful :-)

7:56pm November 19th 2014 via Twitter Web Client in reply to testosticore

RT @kapitanpetko: So Lollipop stock recovery now uses FUSE-over-USB for OTA package sideloading (instead of copying to tmpfs)

11:56am November 19th 2014 via Twitter Web Client

RT @kapitanpetko: TWRP recovery for N9 with automatic default (no PIN) decrypt http://t.co/L3OgoRsAbP

11:55am November 19th 2014 via Twitter Web Client

RT @Fuzion24: wow. Nice bug. CVE-2014-7911: Android <5.0 Privilege Escalation using ObjectInputStream -> http://t.co/PuZu0Xn6Af

11:55am November 19th 2014 via Twitter Web Client

Dalvik and ART presentation by Jonathan Levin - [PDF] http://t.co/IUixqiZ2O0

11:54am November 19th 2014 via Twitter Web Client

@0nem4n i haven't figured out how to do that, you need to watch the replay and save the fr file by recording input in FBA

10:57am November 19th 2014 via Falcon Pro in reply to 0nem4n

@0nem4n not sure if I understand what you want to achieve... any specific example?

10:42am November 19th 2014 via Falcon Pro in reply to 0nem4n

RT @kapitanpetko: @pof Chun Li for the win :)

10:31am November 19th 2014 via Falcon Pro

Dalvik and ART presentation by Jonathan Levin - [PDF] http://t.co/YDjMlQ8k9s

9:46am November 18th 2014 via Twitter Web Client

@Noodlezer ok, gotcha! taking note and maybe I can implement something similar in future releases :)

2:54pm November 16th 2014 via Falcon Pro in reply to Noodlezer

@Noodlezer no idea of ssf4, care to explain it more to me?

2:45pm November 16th 2014 via Falcon Pro in reply to Noodlezer

RT @insitusec: On Android device driver customization ... http://t.co/StQmGy3ocK

12:55pm November 16th 2014 via Falcon Pro

RT @b4l1c: Check out this POC Demo for the Android Broadanywhere Vulnerability. PoC: https://t.co/PJAeIyPb4o Sample: https://t.co/0A0xOU8BX1

11:21am November 16th 2014 via Falcon Pro

RT @invisig0th: vdb/vtrace for Android. Coming soon to a python interpreter near you. http://t.co/dKI6rpng

11:18am November 16th 2014 via Falcon Pro

RT @claud_xiao: Android bug 17356824 "broadAnywhere" vulnerability for Android < 5.0: http://t.co/kd2SGDu8IV (in Chinese)

9:21am November 15th 2014 via Falcon Pro

RT @AndroidTamer: Android bug 17356824 "broadAnywhere" vulnerability for Android < 5.0: http://t.co/3EUGcM0VxG (in Chinese) via @claud_xiao

9:20am November 15th 2014 via Falcon Pro

RT @andremoulu: You want to patch your device before Samsung does it for you? That's explained in the updated article http://t.co/wRMHfSg7mq #pwn2own #fail

6:49am November 14th 2014 via Falcon Pro

RT @k3170Makan: Quick in easy tutorial using on Andoguard to dump Dalvik bytecode http://t.co/uyzwGRG4Zs

10:58pm November 13th 2014 via Twitter Web Client

RT @k3170Makan: jsifenum - A drozer module for enumerating Javascript Interfaces and methods https://t.co/ls48qUH4W5

10:57pm November 13th 2014 via Twitter Web Client

RT @timstrazz: Just dropped a first pass on an AXML (#Android Manifest) template for #010Editor onto github https://t.co/8YuLaKIDMy

10:43pm November 13th 2014 via Falcon Pro

RT @marcograss: The slides for my talk at #ZeroNights - "Steroids for your App Security Assessment" - https://t.co/zvp9O82sZa

10:41pm November 13th 2014 via Falcon Pro

RT @ChainfireXDA: On Lollipop, SuperSU, and CF-Auto-Roots - https://t.co/X82rtgZkEE

10:39pm November 13th 2014 via Falcon Pro

RT @crakun: Android on IRC Freenode: #xda-devs, #droidsec, cyanogenmod, cyanogenmod-dev, teamhacksung-support, koush, android-root Soonet: #android

10:36pm November 13th 2014 via Falcon Pro

RT @abelenko: Great talk by @veorq on crypto fails and crypto coding #zeronights http://t.co/Tha7u2INWR

10:34pm November 13th 2014 via Falcon Pro

RT @AndroidTamer: Lolipop Android 5 Factory images up for Nexus5, Nexus 7 (Wifi only for both 2012 and 2013 model) and Nexus 10 https://t.co/7tc7yhTYgT

10:31pm November 13th 2014 via Falcon Pro

RT @kapitanpetko: @termleech @ablaich @pof Not true, depends entirety on the forceencrypt flag in fstab, by design off for older devices

3:58pm November 13th 2014 via Falcon Pro

RT @ablaich: The upgrade on the Moto G 2nd Gen. from 4.4.4 to 5.0 did not enable full device encryption. #lollipop #incaseyouwerewondering

2:41pm November 13th 2014 via Falcon Pro

RT @Technologeeks: #Android #internals of logging architecture in L (logd) explained in Jonathan Levin's new book - out soon - preview: http://t.co/3xdF8tFSxP

2:40pm November 13th 2014 via Falcon Pro

RT @quarkslab: [BLOG] Abusing Samsung KNOX to remotely install a malicious application by @andremoulu http://t.co/vyIHRrrVOX #Mobile #Pwn2Own #Fail

2:37pm November 13th 2014 via Falcon Pro

RT @kutyacica: Qualcomm Snapdragon 805 crypto engine passed FIPS 140-2 certification (overall level 1) https://t.co/L5uj6iOMvZ

2:34pm November 13th 2014 via Falcon Pro

RT @SantokuLinux: .@SantokuLinux 0.5 is released. Download today: https://t.co/idquSKguLK

2:33pm November 13th 2014 via Falcon Pro

@0nem4n it worked with a browser plugin for firefox, see https://t.co/sZwPoM80aU

1:02am November 12th 2014 via Twitter Web Client in reply to 0nem4n

@0nem4n never mind, found it here: http://t.co/HLVwIad6KV i'll investigate that, thanks! :-)

12:32am November 12th 2014 via Twitter Web Client in reply to pof

@0nem4n wow, where is this from? do you have a bigger screenshot?

12:19am November 12th 2014 via Twitter Web Client in reply to 0nem4n

RT @bigjay517: @htc On the phone with HTC atm. According to them I have to pay $300 in repair for a charging port because I had this "s-off". Any help?

8:41am November 11th 2014 via Falcon Pro

RT @htc: @spikeydoo2006 Hi, S-off means security off. This does not mean you have no warranty. All retail devices have a two year warranty. Thanks.

8:36am November 11th 2014 via Falcon Pro

@CamiJunST no staminus, server is on Linode. GGPO protocol doesn't use encryption at all. Passwords stored salted and hashed on the backend.

7:51am November 10th 2014 via Twitter Web Client in reply to CamiJunST

RT @den4uk: #Andriller 2.3.3 released Includes various improvements overall. Download from: http://t.co/04MaziE4Ne

10:01pm November 9th 2014 via Falcon Pro

RT @den4uk: Adding more features for next #Andriller's release, such as this visual representation of a pattern lock. http://t.co/JnyyJO2g1J

10:00pm November 9th 2014 via Falcon Pro

RT @jduck: The source for yesterday's complaint about AOSP being neutered: http://t.co/IySg7mfLrA

9:50pm November 9th 2014 via Falcon Pro

RT @rafaybaloch: Metasploit Module Released for New UXSS Vulnerability in Android Browser -> http://t.co/UsT6NpiTHm KUDOS to @joevennix and @todb #infosec

9:41pm November 9th 2014 via Falcon Pro

RT @Fuzion24: .@mwrinfosecurity wrote about the same bug I had found awhile back : https://t.co/0yuVNL0cZ9 -> https://t.co/lnvdEKzKec

9:34pm November 9th 2014 via Falcon Pro

RT @FightCade: You can watch Super Turbo Saturdays show by @arkadeum covering #FightCade in twitch archive here - http://t.co/JQr6mNgPCD (starts at min 35)

7:32am November 9th 2014 via Falcon Pro

RT @utkan0s: slide decks from ekoparty 10 for "Exploring the Jolla Phone" and "Bootable Recovery..." are available now: http://t.co/fw4RTnv9S8 #eko10

10:00pm November 7th 2014 via Falcon Pro

RT @cryptax: The slides of the #radare2 workshop, exploitation part, are here: https://t.co/SlbnAmMW6e (exactly: https://t.co/5pizsJgjFM) #hack_lu

9:40pm November 7th 2014 via Falcon Pro

RT @nixcraft: Quick python cheat sheet for your consideration. Source https://t.co/PleBoWAUnU http://t.co/mo7xiW2luf

2:21pm November 7th 2014 via Falcon Pro

@Dhaagon I'm using 3+ different VMs (server & clients/spectators)

11:05am November 7th 2014 via Falcon Pro in reply to Dhaagon

@Dhaagon you're the first one afaik. i have a local setup here for development & it works fine

10:29am November 7th 2014 via Falcon Pro in reply to Dhaagon

@UltraMarioBros thanks, appreciate it :) don't want to beg for donations just yet ... first let's make sure everything works as it should ;)

9:18am November 7th 2014 via Twitter Web Client in reply to UltraMarioBros

@petezin @rallat jejeeje que recuerdos! :-) si nos conocemos, nos hemos visto varias veces en SF y Vegas pero nunca en BCN todavía ;)

9:17am November 7th 2014 via Twitter Web Client in reply to petezin

RT @kapitanpetko: This is new: boot password can be optional on encrypted Android devices, even if lockscreen password is set, http://t.co/XtM0kquXTc

10:31am November 6th 2014 via Twitter Web Client

RT @alsutton: Interesting change for #AOSP #Nexus9 builds; The BSP binaries are on the device in a separate partition - https://t.co/77G3CUboxo

10:30am November 6th 2014 via Twitter Web Client

@Dhaagon mmm... try latest version from git, see if that helps.

9:03am November 6th 2014 via Twitter Web Client in reply to Dhaagon

@kikogotskill should be fixed now, let me know if it's not.

9:01am November 6th 2014 via Twitter Web Client in reply to kikogotskill

@JTMMissingPersn when the base is done (and the strings to translate are less susceptible to change) then we can start working on that; thx!

9:01am November 6th 2014 via Twitter Web Client in reply to JTMMissingPersn

@JTMMissingPersn not thinking on translating it at the moment, but I appreciate your help! I have some bugs to fix & features to implement

9:00am November 6th 2014 via Twitter Web Client in reply to JTMMissingPersn

RT @TeamAndIRC: fastboot verify fastboot lock and fasboot unlock all wipe the nexus9

9:03am November 5th 2014 via Falcon Pro

RT @timstrazz: Got a copy of my own book in the mail today :D glossy hard cover, oh so fancy http://t.co/AdwIkL05zx

12:32am November 5th 2014 via Falcon Pro

RT @kutyacica: Pulling back the curtain: product security at Qualcomm https://t.co/rH4JrMG5KL

12:29am November 5th 2014 via Falcon Pro

RT @AndroidTamer: Test your application for possible TLS/SSL issues : http://t.co/MYHRZQbRfG #nogotofail project code : https://t.co/CUfGpQaBWp #linux Only

12:25am November 5th 2014 via Falcon Pro

RT @jduck: I sent @LiamT a quick recap of Android browser engine history and he published it in his ZDNet article here: http://t.co/sCGHhOeUxA

12:17am November 5th 2014 via Falcon Pro

RT @Gizmodo: Report: A flaw in Visa’s contactless card lets anyone charge it $999,999 http://t.co/PrGeK1pm1d http://t.co/Eoz3qk5uhI

12:10am November 5th 2014 via Falcon Pro

RT @devttyS0: Many D-Link routers have easily calculated default WPS pins: http://t.co/sPqFE5DiYS

11:47pm November 4th 2014 via Falcon Pro

@belek94 @FightCade i still haven't posted the new update to the website...

8:10pm November 4th 2014 via Falcon Pro in reply to belek94

RT @kapitanpetko: Official docs about disk encryption in Android L: http://t.co/uEaSwKlDYL

3:00pm November 4th 2014 via Twitter Web Client

@belek94 @FightCade can't replicate on my computer. When the new update is posted, if it still crashes get back to me and I'll try to debug

12:26pm November 4th 2014 via Twitter Web Client in reply to belek94

RT @FightCade: 3 days after launch, we have 2830 registered users who have played more than 3000 matches! join now: http://t.co/SfmkPOayeA

11:49am November 4th 2014 via Twitter Web Client

RT @FightCade: GGPO-NG has been renamed to FightCade, to avoid confusion with GGPO. We will update the client soon with new features and new name!

11:49am November 4th 2014 via Twitter Web Client

@UltraMarioBros not on my plans now (have a lot of +important bugs to fix), but might be a nice feature for the future. Noted.

5:09pm November 3rd 2014 via Twitter Web Client in reply to UltraMarioBros

@samvonehren then i would have to ask you the password two times to prevent typos, and it will take more time for you to register.

3:57pm November 3rd 2014 via Falcon Pro in reply to samvonehren

@G53Steve specator is for recording games... interface for replay not done yet, will be available in a future update... hopefully soon!

12:37pm November 3rd 2014 via Twitter Web Client in reply to G53Steve

@Brett_J look in /Applications/ggpo-ng.app/

2:32pm November 2nd 2014 via Falcon Pro in reply to Brett_J

@BattousaiCV yes recording server side, will add interface to replay them in the next update

2:31pm November 2nd 2014 via Falcon Pro in reply to BattousaiCV

@rotanibor awesome, i think i took the pic from google images, apparently from here: http://t.co/RUBsKmB9IN thanks!!

9:23am November 2nd 2014 via Twitter Web Client in reply to rotanibor

@sutratune sorry, only can add games that are supported by FBA

7:28am November 2nd 2014 via Falcon Pro in reply to sutratune

@rj47_2004 thanks Eldahon, glad you enjoy it :D

7:27am November 2nd 2014 via Falcon Pro in reply to rj47_2004

@aGrimVale thanks! that's a good idea, adding it to my TODO & will be in the next update

7:26am November 2nd 2014 via Falcon Pro in reply to aGrimVale

GGPO-NG news (2/2): first day online and 934 unique users registered, played 580 games that took 316Mb of disk space on the server

7:23am November 2nd 2014 via Falcon Pro

some news about GGPO-NG (1/2): the project will be renamed soon to avoid confusion with GGPO, if you have ideas for new name send them in :)

7:21am November 2nd 2014 via Falcon Pro

@jmszhao unfortunately new fba is not compatible with old ggponet.dll, will try to integrate fba + shabu netcode in the future

6:34pm November 1st 2014 via Falcon Pro in reply to jmszhao

@Spermgod yeah, try playing with the blitter settings in the menu... some macs can be a bit tricky to get a working config

6:27pm November 1st 2014 via Falcon Pro in reply to Spermgod

@stetime @belek94 @STRhanasu weird, will have to investigate that... sorry

4:17pm November 1st 2014 via Falcon Pro in reply to stetime

@monsieurGlagh compare the two .ini files from ggpofba (original ggpo) and ggpofba-ng (ggpo-ng) and use the same settings from the old

4:15pm November 1st 2014 via Falcon Pro in reply to monsieurGlagh

@PedroSitaras estoy en la esquina de arriba a la izquierda, segunda fila empezando por detrás, 4a silla empezando por la izquierda

2:50pm November 1st 2014 via Falcon Pro in reply to PedroSitaras

@Procrastinos thanks, I'll send you the logo later when I'm back at home :)

2:42pm November 1st 2014 via Falcon Pro in reply to Procrastinos

RT @STRhanasu: ggpo down again? try http://t.co/Z8bN0jnYpk instead. no need to fwd ports as well. @ultradavid @jchensor also thanks to @pof for hard work.

2:08pm November 1st 2014 via Falcon Pro

@mountainmanjed @STRhanasu will try to reproduce that see if I can fix, thanks for the feedback & bug reports

1:23pm November 1st 2014 via Falcon Pro in reply to mountainmanjed

@Spermgod use the .ini file included on the MacOS version of GGPO-NG

1:21pm November 1st 2014 via Falcon Pro in reply to Spermgod

RT @eduSatoe: Hadouken mode by Street Fighter with @pof #crack #ncn2k14 http://t.co/sQtMnhl3mD

1:15pm November 1st 2014 via Falcon Pro

@chencho it's on purpose, to avoid asking it two times. On the backend is salted and hashed using HMAC sha512 ;)

11:21am November 1st 2014 via Falcon Pro in reply to chencho

RT @angel_calzada: Great soft&hardwr hacks for super streetfoghter games talk at #NcN2k14 by @pof https://t.co/GbX2YuVYEB http://t.co/6tJKCq8evC

10:58am November 1st 2014 via Falcon Pro

RT @Miguel_Arroyo76: Grande @pof y su charla sobre Street Fighter Turbo y sus cheats. #Crack #TrainingMode @noconname #NcN2k14 http://t.co/VN3UGUZP2h

10:58am November 1st 2014 via Falcon Pro

RT @jbiosc: "Capcom CPS2 Internals. Reversing Super Street Fighter 2 turbo & Retro-Arcade Cabinet Hacking" Stunning #NcN2k14 @pof http://t.co/YnWYfn8lUf

10:58am November 1st 2014 via Falcon Pro

Officially presenting GGPO-NG, if you like retro arcade games and enjoy playing online, give it a try: http://t.co/8Sv89RbhsA

10:56am November 1st 2014 via Falcon Pro

Slides of my talk on Reversing CPS2 and ST at #ncn2k14 - [PDF] http://t.co/1rG08MPIIO

10:40am November 1st 2014 via Falcon Pro

RT @noconname: Una partidita en medio de la ponencia @pof #NcN2k14 http://t.co/9oEae5Ubq7

10:35am November 1st 2014 via Falcon Pro

@noconname alguien me presta un adaptador de mac a VGA? para la siguiente charla #ncn2k14

9:17am November 1st 2014 via Falcon Pro

heading to #ncn2k14, will present some stuff on Reversing CPS2 and Super Turbo... plus a new service some of you already know about ;)

8:39am November 1st 2014 via Falcon Pro