Tweets from May 2015

YSO Mobile Security Framework: open source mobile app pen-testing framework for static & dynamic analysis - https://t.co/3MCE6QTpsd

3:47pm May 29th 2015 via Twitter Web Client

Hacking Tizen the OS of everything (@ajinabraham) - [PDF] http://t.co/pPZ5MMifrC & paper: http://t.co/zjGRPG5aff

3:42pm May 29th 2015 via Twitter Web Client

The Windows Phone Freakshow - [PDF] http://t.co/ttTuK5yjL7

3:37pm May 29th 2015 via Twitter Web Client

Eight ou two eleven: Dynamic inspection of Broadcom Wi-Fi cards on mobile devices - [PDF] http://t.co/yd7jeM2pn3

3:36pm May 29th 2015 via Twitter Web Client

Opcodes in Google Play: Tracing malicious Applications - [PDF] http://t.co/ZYyr7JHcS0

3:36pm May 29th 2015 via Twitter Web Client

ReDECTed: Building an SDR based DECT sniffer - [PDF] http://t.co/u5yuSjH2TN

11:16am May 29th 2015 via Twitter Web Client

Attacking Android Apps, QARK: Quick Android Review KIT - [PDF] http://t.co/zoIBTIleqi

9:37am May 29th 2015 via Twitter Web Client

The Savage Curtain: Mobile SSL Failures (@SecBro1 & @TusharDalvi) - [PDF] http://t.co/FAMyqol4M9

9:37am May 29th 2015 via Twitter Web Client

Fuzzing Objects d’ ART: Digging Into the New Android L Runtme Internals - [PDF] http://t.co/knxE8zlqxV & paper: http://t.co/VhvM7IxfCT

9:37am May 29th 2015 via Twitter Web Client

Bootkit (root) via SMS: 4G access level security assessment - [PDF] http://t.co/EhKLcgZlAv

9:36am May 29th 2015 via Twitter Web Client

Relay Attacks in EMV Contactless Cards with Android OTS Devices - [PDF] http://t.co/8a4RLGwW7j

9:36am May 29th 2015 via Twitter Web Client

shadowsim: virtual SIM Card tunnel by patching the Baseband of a Mediatek 6573 phone - https://t.co/7XPseivJp5

9:36am May 29th 2015 via Twitter Web Client

Mobile Authentication Subspace Travel (@marver), nice info on MTK baseband - [PDF] http://t.co/lGm93Uon2E & paper: http://t.co/q4qWpmaqY6

9:36am May 29th 2015 via Twitter Web Client

RT @readyState: Things like internet, accounts, storage aren't really considered permissions in M, and can't be revoked. #good http://t.co/d6m9TNUhSn

7:58am May 29th 2015 via FalconPro3 BETA

RT @readyState: This is the warning dialog when revoking permissions for a pre-M targeted app http://t.co/IwuC4CSeTn

7:57am May 29th 2015 via FalconPro3 BETA

RT @AndroidPolice: Android M Developer Preview Will Receive Monthly OTA Updates Until Release http://t.co/PXCwpSTDRa

6:10am May 29th 2015 via FalconPro3 BETA

RT @ikoz: Details on Android's new permission system: http://t.co/hNZsBX6lSa

6:09am May 29th 2015 via FalconPro3 BETA

RT @timstrazz: Published the two CVE details from the #Android blu phone/ADUPS OTA devices that @jcase and I played with https://t.co/TfJsKzskWp

6:07am May 29th 2015 via FalconPro3 BETA

Android M developer preview for Nexus 5, 6, 9 and Player - http://t.co/k3SNShO0aT

5:54am May 29th 2015 via FalconPro3 BETA

RT @AndroidPolice: [I/O 2015] Android M Will Include A New Enhanced Permission Management Scheme With Fine Control Over Apps http://t.co/NNv8Fv1szw

5:45am May 29th 2015 via FalconPro3 BETA

RT @AndroidTamer: Trend Micro Discovers Apache Cordova Vulnerability that Allows One-Click Modification of Android Apps: CVE-2015-1835 :http://t.co/RqHLxkU0R1

8:35am May 28th 2015 via FalconPro3 BETA

RT @in7rud3: Terminal Crashes In #OSX using the evil unicode string that reboots #iOS https://t.co/qLRCBsHpHe

7:28am May 28th 2015 via FalconPro3 BETA

RT @taviso: I wrote a simple tool to help enumerate D-Bus endpoints. https://t.co/DkIqyh8xLB

7:27am May 28th 2015 via FalconPro3 BETA

RT @mikko: Reportedly, the " ॣ ॣh ॣ ॣ " iOS Unicode bug not only crashes iPhones but also the Apple watch. http://t.co/6INL7KbA4z

7:25am May 28th 2015 via FalconPro3 BETA

RT @xdadevelopers: XPrivacy Finally Compatible with Lollipop https://t.co/HZtEKwbhss

10:06pm May 26th 2015 via FalconPro3 BETA

RT @braincode: Modern #linux multipath routing without route caching: http://t.co/0N7cEmxVyV, ping @pof

7:51am May 24th 2015 via Twitter for Android

Interesting read: Android Wear Security Analysis by @mwrlabs - https://t.co/lYsflBkXCi

9:37pm May 22nd 2015 via FalconPro3 BETA

RT @quequero: Snowman decompiler: x86/ARM binary to C/C++, standalone GUI + IDA plugin: https://t.co/BlPT6uMDND http://t.co/VZS93muFTC

6:00am May 22nd 2015 via FalconPro3 BETA

RT @ikoz: Security Analysis of Android Factory Resets http://t.co/s1hsehWYkM by @rossjanderson ~ bad /data & /sdcard wiping makes data recoverable

5:54am May 22nd 2015 via FalconPro3 BETA

RT @matthew_d_green: New research on Diffie-Hellman in TLS. The 'LogJam' attack, a new active attack on export DHE. http://t.co/RBRmOumq1W http://t.co/2BfdXfqzc

1:00pm May 20th 2015 via FalconPro3 BETA

RT @timstrazz: Xamarin doesn’t even include it in the release notes http://t.co/FVLBA03d49 < Seems silly to not warn devs

9:34pm May 19th 2015 via FalconPro3 BETA

RT @timstrazz: Xamarin for Android DLL Hijack Vulnerability http://t.co/rsAVGjcNZb < Heh, so basically execute code inside mono apks compiled with <5.1

9:34pm May 19th 2015 via FalconPro3 BETA

Convert any CPS2 board in to a SSF2T or SSF2X without the need for the daughter board - http://t.co/PJvVe9e6pe

9:27pm May 19th 2015 via FalconPro3 BETA

RT @timstrazz: LDE_PRELOAD hooking library with lots of functions ready for your hooking needs https://t.co/FU3pknSTwT

10:16am May 19th 2015 via FalconPro3 BETA

RT @collinrm: Mobile Security News Update May 2015 part 2 https://t.co/i82tCSaa3K (Collin got a iPhone edition #LOL #YOLO #ROFL)

10:11am May 19th 2015 via FalconPro3 BETA

RT @AndroidPolice: Team Win Recovery Project Now Supports Native Qualcomm Encryption On The OnePlus One http://t.co/Ha3Bz3yPm6

10:11am May 19th 2015 via FalconPro3 BETA

RT @mherfurt: Tricking Lollipop's "Smart Unlock" by Spoofing the Bluetooth Device Address of trusted Devices http://t.co/gcCQBbBqje

10:10am May 19th 2015 via FalconPro3 BETA

RT @hackerfantastic: Current recommended reading selection for hacking Android devices. http://t.co/iGeydLV6qC

10:41pm May 17th 2015 via FalconPro3 BETA

RT @bobpoekert: Little-known fact: all s3 buckets are also bit torrent trackers http://t.co/0rOEZWQRSu

9:08pm May 16th 2015 via FalconPro3 BETA

RT @kapitanpetko: ELC 2015 - Lollipop MR1 Verified Boot, Andrew Boie, Intel https://t.co/TF48VCijKo via @YouTube

6:04am May 14th 2015 via FalconPro3 BETA

RT @rene_mobile: Registration for our first Android Security Symposium in September in Vienna, Austria, is now open at https://t.co/aDYCaQdqxp

5:59am May 14th 2015 via FalconPro3 BETA

RT @xdadevelopers: Android 5.1 and Xposed – XDA Xposed Tuesday http://t.co/HMA3xXOrBg

5:24pm May 12th 2015 via FalconPro3 BETA

RT @jcase: Lets continue with ZTE, bypassing ZTE's write protection https://t.co/JxBLf13QPE

5:20pm May 12th 2015 via FalconPro3 BETA

RT @jcase: System -> root backdoor in ZTE devices https://t.co/Zr6ASEfLOA

5:18pm May 12th 2015 via FalconPro3 BETA

Qualcomm Little Kernel (LK) improper partition bounds checking when flashing sparse images (CVE-2015-0567) - https://t.co/A2ns93tnjs

1:56pm May 12th 2015 via Twitter Web Client

RT @_argp: Android's new libc ships with #jemalloc https://t.co/ipn22zNTT4; looking forward to apply mine and huku's work to it: http://t.co/q8c4lWU9mh

1:07am May 12th 2015 via FalconPro3 BETA

RT @Serianox_: Root detection on Android is useless, so I wrote 200 lines of (ugly) C to prove it. :3 https://t.co/MHqfqtd6l8

5:32pm May 11th 2015 via FalconPro3 BETA

RT @kapitanpetko: Hardware-accelerated disk encryption in Android 5.1 http://t.co/arlkiXspQF

5:22pm May 11th 2015 via FalconPro3 BETA

RT @reyammer: Our @IEEESSP #SP15 paper on deceiving/defending Android users with/from GUI attacks is finally online! http://t.co/GMhrpwR5Z6

5:18pm May 11th 2015 via FalconPro3 BETA

@L30n1d4s @falcon_android @joenrv mine was a proxy.pac issue, make sure your connection isn't pushing you a proxy

2:57pm May 8th 2015 via FalconPro3 BETA in reply to L30n1d4s

RT @maldr0id: Thanks to @timstrazz Maldrolyzer can now extract data from Androrat #Android #malware: https://t.co/G3V3Hb4TfG

5:32am May 8th 2015 via FalconPro3 BETA

RT @JulianBerton: Slides from my @WAHCKon talk on Bypassing Android Binary Protections can be found here: http://t.co/I79xDz52TF

5:28am May 8th 2015 via FalconPro3 BETA

@jduck @koush as it is a webview you don't see the url where it posts your credentials (you don't even know if it uses https)

5:05am May 8th 2015 via FalconPro3 BETA in reply to jduck

@jduck @koush in a malicious 3rd party twitter client, the webview can look like http://t.co/01jncFw9BF and you'd put your credentials

5:03am May 8th 2015 via FalconPro3 BETA in reply to jduck

RT @utoprime: LG Download Mode root python script posted on XDA (not me) - http://t.co/SSRBHzBscf

1:55pm May 7th 2015 via FalconPro3 BETA

RT @Joshua_Brindle: Can someone with a Fire Phone please adb pull /sepolicy, /seapp_contexts and /system/etc/security/mac_permissions.xml and send to me? Please

1:48pm May 7th 2015 via FalconPro3 BETA

RT @0xroot: Android Dynamic Debugging with IDA http://t.co/H4AaBW2vLQ - via @revskills

1:45pm May 7th 2015 via FalconPro3 BETA

RT @collinrm: Mobile Security News Update May 2015 https://t.co/ehjp493eC0 <-- actually an delayed April posting, sorry for the wait guys!

9:20am May 7th 2015 via FalconPro3 BETA

RT @koush: Requiring apps to use embedded WebViews for OAuth fundamentally breaks the security of OAuth.

6:10am May 7th 2015 via FalconPro3 BETA

RT @LukasStefanko: Part 2 of Dynamically inject a shared library into a running process on Android/ARM http://t.co/nupMssOsWa #ARM

6:08am May 7th 2015 via FalconPro3 BETA

RT @LukasStefanko: Dynamically inject a shared library into a running process on Android/ARM http://t.co/An8Ck8f6Vw #Android #Inject #ARM

6:05am May 7th 2015 via FalconPro3 BETA

@quetzal xbmctorrent != popcorntime, also the Nexus Player has cast functionality, so u can stream anything from your phone or chrome to it

11:38am May 6th 2015 via Twitter for Android in reply to quetzal

@quetzal its an Android device, you can install popcorn time, kodi or whatever you like... and it has a convenient remote controller :)

11:18am May 6th 2015 via FalconPro3 BETA in reply to quetzal

@brealorg yeah, still haven't had much time to play with it

11:17am May 6th 2015 via FalconPro3 BETA in reply to brealorg

RT @radareorg: Say Hello to Bokken 1.7 for radare2-0.9.8 http://t.co/ZxedDEWb1H

1:13pm May 5th 2015 via Twitter Web Client

@arkadeum @silentandeadly @therealundamned in case of phoenixing it is advised to wait to have the capacitor totally discharged

10:28am May 5th 2015 via Twitter for Android in reply to arkadeum

@arkadeum @silentandeadly @therealundamned i think you can go ahead and play after the battery change, unless you are phoenixing the board

10:27am May 5th 2015 via Twitter for Android in reply to arkadeum

RT @peterc: ShellCheck - http://t.co/FCsHWi3w4L - detects fragility, issues, and vulnerabilities in shell scripts/code. http://t.co/xp6cVEiNDc

4:09am May 2nd 2015 via FalconPro3 BETA

RT @timstrazz: Slides for @jcase and my talk at #QPSISummit are posted due to requests - enjoy! http://t.co/FofHEOoMCr

3:54am May 2nd 2015 via FalconPro3 BETA

RT @s7ephen: The Chinese version of our book arrived in the mail. It's weird not knowing how to read something you know you wrote. http://t.co/nWClbfL3s7

3:53am May 2nd 2015 via FalconPro3 BETA

RT @yangrunenberger: CalebFenton/simplify · Generic android deobfuscation https://t.co/AgGSWDbmmC

8:28am May 1st 2015 via FalconPro3 BETA