Tweets from July 2015

RT @wish_wu: Details of CVE-2015-3824 is published. http://t.co/xBVFaOnoBA If it contains errors, please make comments there. @jduck @TrendMicro

3:51pm July 31st 2015 via Twitter Web Client

RT @Technologeeks: J Levin @ #AnDevCon on #Android #Input #Architecture - in unprecedented detail, from Android #Internals Vol. 2 - http://t.co/QEopZyVykp

3:48pm July 31st 2015 via Twitter Web Client

RT @AndroidDev: Get your apps ready for the new Auto Backup in Android M: http://t.co/Hi7lx7nzVD #AndroidDev

3:57pm July 30th 2015 via FalconPro3

RT @timstrazz: I don’t use JEB, but maybe these scripts are helpful to someone else for #Android reversing; https://t.co/UbnhfoBDyV

3:55pm July 30th 2015 via FalconPro3

RT @virqdroid: MFFA - Media Fuzzing Framework for #Android (#Stagefright #fuzzer): https://t.co/SreU5qu3TD http://t.co/sSlnwfjAD6

3:51pm July 30th 2015 via FalconPro3

RT @jjarmoc: So, @jduck delivers patches, his name is on the commit, and @USCERT_gov still attributes patches as "from Google" https://t.co/lQAm7PmJHK

3:42pm July 30th 2015 via FalconPro3

RT @Technologeeks: J Levin's #AnDevCon presentation - from today's (wee hours of the) morning session on Android Security - at http://t.co/mP75XGhnPV

3:11pm July 30th 2015 via Twitter Web Client

RT @virqdroid: #StageFright test video MP4 file caused the Anr. Exploiting is another issue... http://t.co/lnyGCCEqjn

2:08pm July 29th 2015 via Twitter Web Client

RT @NowSecureMobile: The #StageFright vulnerability - what you need to know: https://t.co/HbDTYJSwlJ

9:26pm July 28th 2015 via FalconPro3

RT @insitusec: App reversing using @fridadotre by @NowSecureMobile security researcher @oleavr https://t.co/YqLjAyd5bg

9:24pm July 28th 2015 via FalconPro3

RT @Fuzion24: Hardening Android's Bionic (libc equiv) https://t.co/YdL0i6T8Ky

9:23pm July 28th 2015 via FalconPro3

RT @ncweaver: Imagine if Windows patches had to pass through Dell and your ISP before they came to you? And neither cared? That is called Android.

9:19pm July 28th 2015 via FalconPro3

RT @AndroidPolice: Google Representative Promises A Stagefright Security Update For Nexus Devices Starting Next Week http://t.co/7eNTCZP2uG

2:58pm July 28th 2015 via FalconPro3

RT @saidelike: Patches for the stagefright vulnerabilities were pushed by @jduck on CyanogenMod repo https://t.co/GIF7GUxTSO

2:57pm July 28th 2015 via FalconPro3

RT @thomas_cannon: I wonder if @jduck's massive Android vuln will finally be the catalyst for faster vendor patching, once it starts to be exploited at scale?

2:56pm July 28th 2015 via FalconPro3

RT @taviso: I'm not sure if the world is ready for this, but my weekend project was a ctypes module for bash. No joke ;-) https://t.co/epmDZvcoII

2:54pm July 28th 2015 via FalconPro3

How to use old GSM protocols/encodings to know if a user is Online on the GSM Network AKA PingSMS 2.0 - http://t.co/tBiJShbMPl

2:51pm July 28th 2015 via FalconPro3

@ExpertosMV oops, si estuve de viaje y se me pasó! sorry!! ... te lo preparo durante el día de hoy

11:37am July 28th 2015 via FalconPro3 in reply to ExpertosMV

RT @jduck: @collinrm @dangoodin001 further, MMS is only the worst of many attack vectors.

7:22pm July 27th 2015 via FalconPro3

RT @collinrm: Commented on mobile phone update/patch availability. Actually story is about MMS bug discovered by @jduck https://t.co/IAITERhg4d

3:44pm July 27th 2015 via FalconPro3

RT @HITBGSEC: #HITBGSEC Current State of Privilege Escalation on Android - M. Grassi & R. Welton - http://t.co/XKOgJyxHkS cc @marcograss @Fuzion24

3:43pm July 27th 2015 via FalconPro3

RT @hdmoore: bettercap: A complete, modular, portable and easily extensible MITM framework. http://t.co/yvgGK6FI1J

3:42pm July 27th 2015 via FalconPro3

RT @trufae: "Android Riskware", my first blog post at @NowSecureMobile https://t.co/FsQXCIvnnh

3:22pm July 27th 2015 via FalconPro3

RT @timstrazz: Just released the “native-shim” for loading/reversing/debugging native libraries faster on #Android https://t.co/rXXtthbQRK

3:13pm July 27th 2015 via FalconPro3

RT @_jsoo_: Samsung S5 Arbitary File Retrieval during SBeam Transfer - https://t.co/psVUEJhlfx https://t.co/If3iDXl3LF

3:06pm July 27th 2015 via FalconPro3

RT @firewaterdevs: Well that was less fun than usual. @jcase @HTCUSA @htc http://t.co/NyfmsGg7nF

2:58pm July 27th 2015 via FalconPro3

@ExpertosMV recibido, te contesto durante el finde!

8:38pm July 22nd 2015 via FalconPro3 in reply to ExpertosMV

RT @collinrm: Write-up about "Hacking Team using my Android tools" https://t.co/G9xswb6XiG #hackedteam Not happy about this! Please RT!

10:30pm July 21st 2015 via FalconPro3

RT @jduck: The #droidsec hosted "developer changelog" from Android m-preview to m-preview-1 is now live! http://t.co/CFuqUwtakE Enjoy!

4:05am July 17th 2015 via FalconPro3

RT @Technologeeks: ImgTool for binary images and sparse filesystems - from J Levin's #Android #Internals - v0.3 - can now make bootimg http://t.co/soeTP0tMNM

5:44pm July 16th 2015 via Twitter Web Client

RT @insitusec: nice blog post by @pof summarizing #android M from security research perspective (part 1) https://t.co/mReyLJxT1d

4:30pm July 16th 2015 via Twitter Web Client

I wrote a new post on @NowSecureMobile blog: Android M, A Security Research Perspective (Part 1) - https://t.co/JHeG2tdy10

4:30pm July 16th 2015 via Twitter Web Client

RT @rcvalle: #OpenSSL Alternative Chains Certificate Forgery (CVE-2015-1793) MITM Proxy on Metasploit soon https://t.co/bHzt0vTyRn

2:27pm July 16th 2015 via Twitter Web Client

RT @AppThwack: We've joined AWS! Check out AWS Device Farm to test your apps on real phones and tablets in the AWS Cloud. https://t.co/qdF3V7ldiO

5:49am July 16th 2015 via FalconPro3

RT @AndroidDev: Helping your apps work smarter: Introducing the #GoogleBeaconPlatform and the #Eddystone BLE beacon format. http://t.co/FSSfXeIAVd

5:47am July 16th 2015 via FalconPro3

RT @Agarri_FR: Overview of the Android exploit http://t.co/jXHDDuLRSg // If you're in XSLT, read https://t.co/aKMmqN2ASQ #PreviousTweet

3:44pm July 14th 2015 via Twitter Web Client

RT @Agarri_FR: The HackingTeam exploit for Android 4.x using (very old) bugs from @scarybeasts and me is incredibly cool. Tons of XML and XSLT tricks!

3:44pm July 14th 2015 via Twitter Web Client

RT @kapitanpetko: SnooperStopper: Automatically prompts you to change FDE password if lockscreen PIN/password is changed (needs root) https://t.co/qmvMY3ZNtM

1:06pm July 14th 2015 via FalconPro3

RT @NowSecureMobile: NowSecure Lab advanced security analyst toolset version 3.5 is available now. New features and updates: https://t.co/sMICuiCBN9

1:04pm July 14th 2015 via FalconPro3

RT @MalwareMustDie: HackingTeam's Android Exploit < nice review by Tencent Sec Response Center. In English: http://t.co/rHsIM8WaDR ori: http://t.co/V7v5wPG

4:23pm July 13th 2015 via FalconPro3

RT @thomas_cannon: PGP on Android using GPG applet on Yubikey, via NFC. Useful to PGP while mobile without storing priv key on dev. https://t.co/HKwJKTjoIH

12:27pm July 13th 2015 via FalconPro3

RT @Technologeeks: Another #Android #M Preview, Another #ART/#OAT #internals change.. #Dextra updated: v017/v063 http://t.co/CenGK36NE3. http://t.co/sHk8obgogL

12:24pm July 13th 2015 via FalconPro3

RT @AndroidTamer: HackingTeam Android Browser Exploit analysis by tencent http://t.co/fdHm4YpA2e english translated version (https://t.co/CbcBQrRatG)

8:12am July 13th 2015 via FalconPro3

RT @CopperheadSec: Android M preview 2 contains a nice security improvement: https://t.co/qn6yVtH1kH http://t.co/FfMo6HHkD2

7:56am July 13th 2015 via FalconPro3

RT @marcan42: OpenSSL today: You get a CA! And you get a CA! And you get a CA! Everybody gets a CA! http://t.co/CpkCyJSkdp

1:46pm July 9th 2015 via Twitter Web Client

RT @AndroidTamer: Android ADB backup APK Injection, install application with arbitrary permission by restoring another app backup POC: https://t.co/HfJfK4MmAG

1:40pm July 9th 2015 via Twitter Web Client

RT @evilsocket: this is a modified towelroot, not reversed, a mod to the original src code ... where did they get it? #hackingteam https://t.co/eFHy1MV7u9

8:59pm July 7th 2015 via FalconPro3

RT @Gunther_AR: Reverse Engineer Obfuscated Android Applications by @tkeetch http://t.co/0iO7hi4VuE cc @timstrazz

8:40pm July 7th 2015 via FalconPro3

RT @jcase: HackingTeam's android tools use Alephzain's framaroot and GeoHot's Towelroot, as fi01'sputuser exploits. We need reconsider how we publish

11:39pm July 6th 2015 via FalconPro3

RT @timstrazz: This article reads like a what to reverse next... http://t.co/Y1wpuQWSUt except I've already looked at them all :/

11:20pm July 6th 2015 via FalconPro3

RT @revskills: Control and manage Android devices from your browser. https://t.co/Dd1PJCvq6d https://t.co/BCLggTrXNw via @insitusec

10:59pm July 6th 2015 via FalconPro3

RT @timstrazz: BunnyBlue has an interesting #Android project for auto installing applications via Accessability Service (ab)use https://t.co/nqMSGA4rH7

10:54pm July 6th 2015 via FalconPro3

@GamesDoneLegit awesome, can't wait to see the rest of your blog posts. Long live ST!

11:50pm July 3rd 2015 via FalconPro3 in reply to GamesDoneLegit

RT @ph0b: Here is what I think every Android dev should know (about .so files): http://t.co/609JrbssF3

4:43pm July 1st 2015 via FalconPro3

RT @in7rud3: Vulnerability in 802.11n standard allows remote injection of Wi-Fi frames networks https://t.co/KCm7Cy57QL < PoC

9:19am July 1st 2015 via FalconPro3

RT @timstrazz: Offensive & Defensive Android reverse engineering by @jcase, @caleb_fenton and myself will be @_defcon_ this year https://t.co/SOVE8zcBkR

8:36am July 1st 2015 via FalconPro3

RT @DMBisson: New Android Vulnerability Can Lead to Exposure of Device Memory Content http://t.co/0uA5o1MHpq @TrendMicro @TrendLabs http://t.co/1tl2TG7FG5

8:35am July 1st 2015 via FalconPro3

RT @timstrazz: Fork off Xposed called Dexposed; allows non-invasive hooking/injection into own apps and AOSP framework https://t.co/0IJnM20XkT

8:08am July 1st 2015 via Twitter for Android