Tweets from August 2015

RT @jcase: Threat to unlocked bootloaders? https://t.co/DgxkjiZo8d

3:54am August 30th 2015 via FalconPro3

RT @claud_xiao: Taiwan ed of Android Hacker's Handbook for sale at HITCON. I've nothing to say on cover design and slogan... @jduck http://t.co/sZFwmLFJk4

3:46am August 30th 2015 via FalconPro3

RT @Mobile_Sec: Fuzzing the Media Framework in Android by Alexandru Blanda Slides: http://t.co/4PYvcvD9XQ Video: https://t.co/wRVS6ZRybY

11:40pm August 28th 2015 via FalconPro3

RT @_jsoo_: PoC for CVE-2015-1528, Exploiting Heap Corruption due to Integer Overflow in Android libcutils - https://t.co/zeokLJ0N6x by @oldfresher

4:01am August 28th 2015 via FalconPro3

@YouTubeGaming @YouTube Y U no make the times in the vid description clickable links like in the browser version??? http://t.co/qceOxCulM9

10:20pm August 27th 2015 via FalconPro3

RT @AndroidDev: Try the new #AndroidAuto Desktop Head Unit, a testing tool that let's your workstation emulate the in-car experience http://t.co/DPnSG0GERK

9:52pm August 27th 2015 via FalconPro3

RT @AndroidDev: #BuildBetterApps with Android 6.0’s runtime permissions. Learn how they work and best practices: http://t.co/KP06awShRp

9:50pm August 27th 2015 via FalconPro3

RT @opersys: Our updated Android Cross-Reference covers every single Android release (all 133) ever made: http://t.co/QIGyaPPKKv

9:45pm August 27th 2015 via FalconPro3

RT @Mobile_Sec: Adrian Ludwig's @BlackHatEvents USA 2015 "Android Security State of the Union" talk presentations: https://t.co/kIXYw4nQM8

9:44pm August 27th 2015 via FalconPro3

RT @Fuzion24: . @pof using pfp-vim to parse some mp4 binaries http://t.co/SbnCHj9NoU

3:28pm August 27th 2015 via Twitter for Android

pfp-vim: a vim hex-editor plugin that uses 010 Editor templates to parse binary data using pfp - https://t.co/ivpDja5b14 (very useful!!)

3:19pm August 27th 2015 via Twitter Web Client

RT @cryptax: If you aren't bored with #Android #StageFright, my blog post on #details is finally out (no, the title is not mine) http://t.co/DxTXDS5578

4:58am August 27th 2015 via FalconPro3

RT @Fuzion24: Restricted write-what-where in Android (MSM) Kernel in display drivers touchable via shell: http://t.co/qpaer2WysA

4:57am August 27th 2015 via FalconPro3

RT @BlackHatEvents: Newly released VIDEO: “Stagefright: Scary Code in the Heart of Android” #BHUSA 2015 Briefing by @jduck http://t.co/DBK88znY53

4:56am August 27th 2015 via FalconPro3

RT @laginimaineb: Published a new post about a (locally exploitable) Android linux kernel vulnerability - http://t.co/L48k6ayJF6

4:56am August 27th 2015 via FalconPro3

RT @Fuzion24: Once you pop media_server on Android, here's your camera gid -> root : https://t.co/a0MPiEQELW

4:56am August 27th 2015 via FalconPro3

RT @0xroot: Effectively bypassing kptr_restrict on Android - http://t.co/JDfX4xxYuC

4:43am August 27th 2015 via FalconPro3

RT @cryptax: Our paper - presented at #TrustCom - is available here: http://t.co/vsVSLPWllp #sherlockdroid #alligator #android

2:34pm August 25th 2015 via FalconPro3

RT @AndroidTamer: HONGGFUZZ now supports android thanks to @anestisb : https://t.co/4DIeXuXSPz : A general-purpose, easy-to-use fuzzer

2:27pm August 25th 2015 via FalconPro3

RT @beist: A demo by my coworker's exploit against the stagefright bug by @jduck on a real phone. http://t.co/8sYqw1f7II

10:28am August 25th 2015 via Twitter Web Client

CVE-2015-3842 - https://t.co/DrFQQMnU1t MediaServer Takes Another Hit with Latest Android Vulnerability - http://t.co/sKj8T1U615

2:34pm August 24th 2015 via Twitter Web Client

RT @_jsoo_: Exploit Android MSM8974 Chipset - https://t.co/x66U8c3YOA

12:38pm August 24th 2015 via FalconPro3

RT @Fuzion24: Remote Code Execution in Dolphin Browser for Android: http://t.co/pM8W7Z9tDc it's nice to see people building on our work!

9:13pm August 23rd 2015 via FalconPro3

RT @jduck: Posted up AOSP developer change logs for M-preview-1 to M-preview-2 http://t.co/J4xSr4ufZ1 Check em out!

9:12pm August 23rd 2015 via FalconPro3

RT @guano: Got my CPS-2 All In One completed and ready for weeklies. Attached to my UD-CPS2. #FMIWT @jchensor http://t.co/OBKOZlSl64

9:10pm August 22nd 2015 via FalconPro3

RT @psifertex: I'm not the only one crazy enough to think CTFs are e-sports. http://t.co/IemqiHgbng

10:53pm August 21st 2015 via FalconPro3

RT @collinrm: Mobile Security News Update August 2015 https://t.co/jODC2WzYMF Some catching up since June!

10:49pm August 18th 2015 via FalconPro3

RT @jcase: .@timstrazz myself, and possible beaups will be doing a /r/android AMA on Android security/privacy/malware from 4-5EST.

4:00pm August 18th 2015 via FalconPro3

RT @marver: How I binary patched the broken stagefright patch myself: https://t.co/4qRKBszeVF on fixing CVE-2015-3864.

3:59pm August 18th 2015 via FalconPro3

RT @iagox86: New blog: Why DNS is awesome and why you should love it: https://t.co/Fomb7IIqoo (also releasing a tool: dnslogger.rb)

3:53pm August 18th 2015 via FalconPro3

RT @_jsoo_: New acquisition method based on firmware update protocols for Android smartphones - http://t.co/u6zqmXSv7Z

7:09am August 18th 2015 via Twitter Web Client

Differences from Android API level 22 to API level 23 (Android 6.0): https://t.co/cuaErIgi7H

7:08am August 18th 2015 via Twitter Web Client

RT @FioraAeterna: ARMv7: a 32-bit ARM instruction set ARM7: an old ARM that's ARMv4, not ARMv7 Cortex A7: a low-end ARMv7 chip Apple A7: a high-end ARMv8 chip

4:13pm August 17th 2015 via FalconPro3

RT @CTXIS: New blog release! Andy Monaghan looks at #KGDB on #Android & debugging the kernel.. http://t.co/q0N75ITUlM

10:02am August 17th 2015 via FalconPro3

RT @Technologeeks: Disarm - A simple command line #ARM64 disassembly/opcode lookup utility for #iOS and #Android: http://t.co/uPkC2vfyZF http://t.co/90AD57ahRZ

9:03am August 17th 2015 via FalconPro3

RT @_jsoo_: JEB Plugin for decrypt DexGuard encrypted Strings - https://t.co/8d4OkDX1nj by Anton Kosterin

9:00am August 17th 2015 via FalconPro3

RT @laginimaineb: Just published a new post about an Android kernel vulnerability and exploit I wrote - check it out: http://t.co/DPal8VftV8

8:51am August 17th 2015 via FalconPro3

RT @Fortinet: @ExodusIntel We just posted a PoC of #stagefright being exploited through WhatsApp and Telegram http://t.co/1jd2LZpIuY

8:31am August 17th 2015 via FalconPro3

RT @zxcvgm: Boxify: Full-fledged App Sandboxing for Stock Android (no rooting required) https://t.co/1gm3DrmfJm /cc @timstrazz

8:26am August 17th 2015 via FalconPro3

RT @scarybeasts: The @jgrusko "bad patch" stagefright bug is one of (many) ongoing N-way bug collisions :P @natashenka's report: https://t.co/WnDD54ZtI7

8:25am August 17th 2015 via FalconPro3

@eltroubleSRK @arkadeum no worries, just make sure u test it and get how it works before you go live on stream :) and lmk if u've questions

8:34pm August 15th 2015 via FalconPro3 in reply to eltroubleSRK

RT @jduck: If you are looking for my @BlackHatEvents / @_defcon_ slides you can find them here: http://t.co/BkXYuL38Pf

7:10pm August 15th 2015 via Twitter Web Client

RT @SecBro1: @pof QARK is available now. Let us know how it works for you: https://t.co/5RrAmB9a5i All non-trolling feedback appreciated

3:03am August 15th 2015 via FalconPro3

@arkadeum @eltroubleSRK made a bundle of my ST training+hitboxes+input display, u'll find it useful for ST saturdays: http://t.co/tVM9ejFC1T

3:00pm August 14th 2015 via Twitter Web Client

RT @Fuzion24: A stagefright bug collision between Project Zero and exodus intel https://t.co/n4Yv71sExU

12:55pm August 14th 2015 via FalconPro3

RT @jduck: Battling to add CVE-2015-3864 to the #Stagefright Detector app... While you wait, here's a patch - https://t.co/Aqo2ZBc4RW

12:54pm August 14th 2015 via FalconPro3

RT @jduck: Congratulations to @ExodusIntel and @jgrusko for finding bugs in code I patched! Who knew you could use 64-bit chunk sizes? Why?!

12:52pm August 14th 2015 via FalconPro3

RT @ExodusIntel: Stagefright is still exploitable on 950+ million Android devices. Read the latest on our blog https://t.co/FnyIBo2642 #droidsec #stagefright

12:51pm August 14th 2015 via FalconPro3

RT @jduck: Zero Day Exploit Firm @ExodusIntel Goes Full-Disclosure on an unpatched Stagefright Vulnerability https://t.co/oVN8XfluCh

12:50pm August 14th 2015 via FalconPro3

RT @mwrlabs: Advisory: Sandbox bypass through Google Admin Android app WebView http://t.co/qWDMxGvv51 @trotmaster99

12:48pm August 14th 2015 via FalconPro3

RT @_jsoo_: Lobotomoy is an Android security toolkit that will automate different Android assessments & RE tasks. https://t.co/6ftYDnYBBO by @rotlogix

10:12pm August 13th 2015 via FalconPro3

w00t!! Excited to see the first #Android "Nexus Security Bulletin" (August 2015) - https://t.co/FuS7rX3FTb

5:26am August 13th 2015 via FalconPro3

RT @lostinsecurity: Locker: an Android ransomware full of surprises http://t.co/kne6MnWVdl <- with decryption thanks to @cryptax :)

5:20am August 13th 2015 via FalconPro3

RT @benhawkes: A non-libstagefright vulnerability in the Android mediaserver (via MIDI): https://t.co/6EhtLil1DM

4:55am August 13th 2015 via FalconPro3

RT @timstrazz: Slides for @jcase @caleb_fenton and my class are on #android reverse engineering now available on our github https://t.co/2Yl0UMUF7u

1:11am August 11th 2015 via FalconPro3

@Jack04311910 attacker is from Morocco, attack comes from spoofed addresses all over the world.

11:20pm August 10th 2015 via Twitter for Android in reply to Jack04311910

RT @jedisct1: Exploiting Android Users for Fun and Profit http://t.co/eqT26YNHZs (a legitimate .xyz domain!)

10:59pm August 10th 2015 via Twitter Web Client

RT @d0c_s4vage: Finally announcing pfp! a python-based 010 template interpreter http://t.co/vv6KhjdFs4

8:54pm August 10th 2015 via FalconPro3

RT @timstrazz: “HTC Peap” vulns we disclosed at our workshop are now on the red naga repo; https://t.co/Jh4xpIKcoj

8:47pm August 10th 2015 via FalconPro3

@SecBro1 thanks! looking forward to it :)

8:33pm August 10th 2015 via FalconPro3 in reply to SecBro1

RT @insitusec: World Writable Code Is Bad post by @NowSecureMobile researcher Jake Van Dyke https://t.co/1RXhw7Danu

3:50pm August 10th 2015 via Twitter Web Client

RT @_jsoo_: One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android - https://t.co/deCcMC5mFt

2:50pm August 10th 2015 via FalconPro3

RT @laginimaineb: Just published the full exploit and writeup for the TrustZone vulnerability. http://t.co/h07AkBnbiI

2:30pm August 10th 2015 via FalconPro3

RT @andremoulu: Full TrustZone exploit for MSM8974 https://t.co/EmCM6U7PLP by @laginimaineb

7:03am August 10th 2015 via FalconPro3

Universal Android rooting is back #BHUSA slides https://t.co/pK6JUOEyDa

3:42am August 9th 2015 via FalconPro3

RT @jcase: Our Qualcomm LPE vuln from our #defcon workshop https://t.co/lunpWlGSnw @caleb_fenton @timstrazz

3:33am August 9th 2015 via FalconPro3

RT @raulfraile: Based on "mov is Turing complete" (http://t.co/9A1FAJKKav), someone wrote a C compiler that only generates mov inst. https://t.co/TrA3o7o9kV

3:30am August 9th 2015 via FalconPro3

RT @Fuzion24: Fuzzing Android Binder and escalating privledges: https://t.co/thgCJyIASh

2:53am August 8th 2015 via FalconPro3

RT @cryptax: That video with the remote shell (#StageFright) is really impressive! Finding vuln is one thing, exploiting them is another congrats @jduck

10:09pm August 7th 2015 via FalconPro3

RT @_r04ch_: Ransom'wear' : #Android Simplocker Ransomware on a Smartwatch https://t.co/g1xcjAz8Wz

10:06pm August 7th 2015 via FalconPro3

@CamiJunST @FightCade the only thing I recognize here is htop on the top right window, but I have 2 admit the ascii logo looks kinda cool :)

9:47pm August 7th 2015 via FalconPro3 in reply to CamiJunST

RT @JasensCustoms: Let's talk about video encoding for CPS2 and CPS3 consolization today! http://t.co/ZXXWPrhgJ2 #Arcade #CPS3 #CPS2

4:47am August 7th 2015 via FalconPro3

RT @DanlAMayer: Slides of @utkan0s and my #BHUSA talk on Realities of Secure Storage on Mobile Devices and ROSIE POC are online now: https://t.co/PWDFhPbGQT

5:43pm August 6th 2015 via FalconPro3

RT @cryptax: That's the URL: https://t.co/irpHdY0hT9 #StageFright now you know what's in the report ;)

12:53pm August 6th 2015 via Twitter Web Client

RT @Mobile_Sec: If you are interested in mobile malware; but haven't heard about @koodous_project, take a look. It is a great effort https://t.co/cDeZW6ir5A

12:10pm August 6th 2015 via FalconPro3

RT @AndroidPolice: Google Posts Stagefright-Fixing LMY48I Factory Images For Seven Nexus Devices http://t.co/gR8MSJigRJ

5:23am August 6th 2015 via FalconPro3

RT @Techmeme: Google announces it will provide monthly OTA security updates to Nexus devices http://t.co/AcnTvLLjrw http://t.co/3hGuCFVX5i

5:22am August 6th 2015 via FalconPro3

RT @kutyacica: Oh, Gal Beniamini published his Qualcomm TZ vuln at last. http://t.co/0WBlugj6B3 Previous post: http://t.co/EVZenHUuEB

5:07am August 6th 2015 via FalconPro3

RT @returnsme: Full source code and details about my TZ exploit (。・`ω´・) https://t.co/AXk8vJcDY8

12:15pm August 4th 2015 via FalconPro3

RT @jebdec: Great tutorial on JEB1 API! https://t.co/L9r2yfeUWB

8:58pm August 3rd 2015 via FalconPro3

RT @jduck: Want your Android Hacker's Handbook signed? Join @quine @collinrm @s7ephen @ochsff and I at @BlackHatEvents Reef F on Thursday at 10:35am !

8:56pm August 3rd 2015 via FalconPro3

RT @benhawkes: @daveaitel For some historical bugs that P0 found in Android: https://t.co/XEN8b6ECC7 and https://t.co/weD09MeBhV (90-day deadline)

10:04am August 3rd 2015 via FalconPro3

RT @jduck: Yo dawg. I heard you like shells.. http://t.co/8tSuOEzYBN \o/

10:02am August 3rd 2015 via FalconPro3

RT @_jsoo_: Huawei mate 7 TrustZone exploit - https://t.co/NOtORPmMC7 by @returnsme

9:59am August 3rd 2015 via FalconPro3

RT @_jsoo_: 再探Stagefright漏洞——POC与EXP - http://t.co/DWzQBPyUNT by Cheetah Mobile Security Laboratory Everyone mobile company in China with own writ

9:58am August 3rd 2015 via FalconPro3

@Arikello osti... hace tiempo ya! acabé consiguiendo esto https://t.co/QJ24AnAdSj mira a ver si te sirve

8:45am August 1st 2015 via FalconPro3 in reply to Arikello