Tweets from October 2015

RT @ikoz: Remote attestation for TEEs and Verified Boot will be possible on Android N https://t.co/4buXlLlrOt - no doubt it will be used by SafetyNet

8:06am October 31st 2015 via FalconPro3

RT @AndroidTamer: New Android Tool Chain: Jack (Java Android Compiler Kit) : replaced proguard: inbuild obfuscation and renaming : https://t.co/mrVstOdG2p

8:01am October 31st 2015 via FalconPro3

RT @ChainfireXDA: Experimental root-without-modifying-system boot images and SuperSU BETA available for all the Marshmallow Nexuses - https://t.co/yIlPX2XBWT

8:00am October 31st 2015 via FalconPro3

RT @ChainfireXDA: For the experimentally inclined Nexus 5 Marshmallow user: https://t.co/yIlPX2XBWT . Root without modifying /system.

7:57am October 31st 2015 via FalconPro3

RT @caleb_fenton: This is a classic. It used to break baksmali too. I -think- Freedom does this. https://t.co/oWvdJJOpAX

12:13am October 30th 2015 via FalconPro3

RT @4Dgifts: "Implement Library Load Order Randomization" in Android's bionic https://t.co/tRBJJw8jcW

12:09am October 30th 2015 via FalconPro3

RT @Fuzion24: Android VTS an OSS vulnerability checker for Android has been released to the Play store: https://t.co/G79FmoG50x

12:45pm October 29th 2015 via FalconPro3

RT @Fuzion24: Remote Code Execution as System on Samsung devices via @andremoulu // https://t.co/eBJzRxSt2V and the AndroidVTS check for is implemented!

3:54pm October 28th 2015 via Twitter for Android

RT @jcase: Sample output from my dalvik disassembler, it supports the compact referenced format, as well as smali. https://t.co/2Jphgzo2k7

1:50pm October 28th 2015 via Twitter Web Client

RT @ngkogkos: My Android RAM forensics presentation is up: https://t.co/NFdNZhweia #infosec #DFIR #android #forensics

11:16pm October 27th 2015 via FalconPro3

RT @raviborgaonkar: Our paper on SEAndroid policy mistakes in the wild from 8 different Android devices. https://t.co/YeB3h8rIKu & tool https://t.co/IaQJ7Jy

8:05pm October 27th 2015 via FalconPro3

RT @PaulOBrien: Fast charging and USB Type-C is a complete mess. Why don’t any of the C devices support QC2? And what’s with the 5V/3A chargers instead?

9:33pm October 26th 2015 via FalconPro3

RT @MarieGMoe: My #hacklu keynote slides on living with a vulnerable medical implant are available here: https://t.co/SrBierYfAt

9:25pm October 26th 2015 via FalconPro3

RT @ryanaraine: For the three of you with the Ubuntu phone, there's a security issue you might want to pay attention to https://t.co/CPGJuhNu5J

3:43pm October 25th 2015 via FalconPro3

RT @kutyacica: Long Term Exploitation https://t.co/HP1QyDtCMS 4G security gaps based on 3GPP specs. slides discuss IMSI catching, tracking, RCE, DoS, etc.

3:31pm October 25th 2015 via FalconPro3

RT @corkami: [Slides] Hacks in video games - #hacklu's Cryptoparty4kids https://t.co/7g1G34Jnuo https://t.co/BT3CpummaI

3:03pm October 25th 2015 via FalconPro3

RT @collinrm: Mobile Security News Update October 2015 part II https://t.co/EXoPZUIps5 The Blackberry PRIV might be the first Android phone with grsec

2:58pm October 25th 2015 via FalconPro3

RT @timstrazz: Updated the 010Editor ELF Template for better usage on ARM files, can be useful if you do anything on #Android https://t.co/nva76KE3v4

2:53pm October 25th 2015 via FalconPro3

RT @cure53berlin: We recently did an audit against OpenKeychain, an Android OpenPGP implementation. And as usual, here is our report! https://t.co/0AqEMDMjeR

2:46pm October 25th 2015 via FalconPro3

RT @esizkur: Is the BlackBerry Priv the first Android device that comes with a -grsec kernel? (/cc @spender) https://t.co/Z9Fk19tOLL

2:46pm October 25th 2015 via FalconPro3

RT @agl__: Some notes for Android and Chromium developers about BoringSSL: https://t.co/vdnelgiHeN

2:15pm October 25th 2015 via FalconPro3

RT @FightCade: 365 days, +150k users from 143 different countries, +2 Million games played. Happy first anniversary #FightCade :) https://t.co/7MmKzvbdq1

10:10am October 23rd 2015 via Twitter Web Client

@carlesanagustin a veure quan te'l instal·les i fem un Street Fighter :)

2:12pm October 21st 2015 via Twitter for Android in reply to carlesanagustin

@jjarmoc @Dave_Maynor odex (optimized DEX), magic is 'dey\n036'

9:34pm October 20th 2015 via FalconPro3 in reply to jjarmoc

RT @collinrm: Interesting benchmarks of Android disk encryption on different devices. https://t.co/DyXbzGcMiu

7:13pm October 19th 2015 via FalconPro3

@s7ephen oh nope! osx elcapitan broke my @radareorg install, and had to find a creative way to hexedit a file quickly! :)

12:55pm October 19th 2015 via Twitter Web Client in reply to s7ephen

RT @raimue: @pof @schniggie See also :help hex-editing for an example on how to automatically apply xxd filters on read/write with vim -b.

12:51pm October 19th 2015 via Twitter for Android

#protip: Hex edit in Vim $ vim file.bin :% ! xxd Edit. :% ! xxd -r Save. http://t.co/Ou1NjaIkA6

12:34pm October 19th 2015 via Twitter Web Client

RT @angealbertini: "MAME and preservation of software" by @micko_mame https://t.co/wWXJayZAuk

3:22am October 19th 2015 via FalconPro3

RT @xdadevelopers: Sorry guys, if you want root on Android Marshmallow, you need a modified boot image http://t.co/v86LGzmWwd http://t.co/0h5V82oEyv

3:21am October 19th 2015 via FalconPro3

RT @caleb_fenton: v0.9.0 of simplify has been released, thanks to @hubert3 for the error reports: https://t.co/1IR016waxD

8:04pm October 18th 2015 via FalconPro3

RT @kapitanpetko: SELinux in Android Lollipop and Marshmallow http://t.co/QrM8sqZkrf < MLS for multi-user added

7:19pm October 18th 2015 via FalconPro3

RT @CasualEffects: I just released Markdeep http://t.co/Iqk5YDMaQd. It is like Markdown on steroids, with client-side viewing. http://t.co/DciqIIkQT8

6:57pm October 18th 2015 via FalconPro3

RT @jduck: With the new permissions model in Android 6, I got my feature request of no auto-download in the browser. Just deny STORAGE permission :-)

8:45am October 18th 2015 via FalconPro3

RT @marcograss: The slides for @Fuzion24 & me talk "Current State of Android Privilege Escalation" - http://t.co/utIKAzaJjo

6:43am October 17th 2015 via FalconPro3

RT @laginimaineb: Shout out to @macrograss for writing a PoC for CVE-2014-4323! Check it out https://t.co/OIK99w4mCe

6:40am October 17th 2015 via FalconPro3

RT @andremoulu: Current State of Android Privilege Escalation - @Fuzion24 and @marcograss #HITBGSEC http://t.co/8LxTmfdiVK

6:38am October 17th 2015 via FalconPro3

AOSP 4.4.4 ROM for grouper (Nexus7) with DexHunter automatic unpacker built in by @t436h05t - http://t.co/voCHbTghfF

11:40pm October 15th 2015 via FalconPro3

RT @AndroidTamer: Android Xposed Module to bypass SSL certificate validation (Certificate Pinning) : https://t.co/pWP4PwCaev

7:09pm October 15th 2015 via FalconPro3

RT @ikoz: Using Android's tamper detection securely: https://t.co/n6lcSJNVAu - most implementations out there are trivially by-passable

7:06pm October 15th 2015 via FalconPro3

@jduck @matthias_kaiser i know, just being too lazy and waited for the update to appear :P my other N6 is on 6.0 but I flashed factory image

12:20am October 15th 2015 via FalconPro3 in reply to jduck

New nexus 6 OTA update showed up today, but oh surprise is not #marshmallow! #LMY48T http://t.co/FFG9wboVNh

7:13pm October 13th 2015 via FalconPro3

RT @jduck: Android 6.0 devices get an even bigger attack surface from a locked device's lock screen - https://t.co/F2M5wDpbgE

2:16pm October 13th 2015 via FalconPro3

RT @virqdroid: #DexHunter - Interesting conclusions on some Android packers/protectors - http://t.co/uS0D3kaIgl (Chinese)

9:07am October 13th 2015 via FalconPro3

RT @AndroidTamer: AndroidEagleEye: Xposed + adbi module : can hook both Java and Native methods : https://t.co/o3uZdktw4J

8:54am October 13th 2015 via FalconPro3

RT @kapitanpetko: Looks good, Google account auth should work: FLOSS Play Services compatible framework http://t.co/sY6EBm4l2H

12:15pm October 8th 2015 via Twitter Web Client

sediff output of the changes done by Chainfire's supolicy to sepolicy to allow root in Enforcing mode - https://t.co/0W1oryOuZa

12:15pm October 8th 2015 via Twitter Web Client

RT @jduck: The October 2015 Nexus Security Bulletin is out! https://t.co/CrD9zzdY0X New Android M and L firmwares posted too! AOSP push underway.

12:14pm October 8th 2015 via Twitter Web Client

RT @CopperheadSec: Both critical libutils vulnerabilities Google disclosed today are caught by the integer overflow checking in AOSP master (and CopperheadOS).

9:56am October 8th 2015 via Twitter Web Client

RT @revskills: supersu 2.50 updated to work with marshmallow http://t.co/cka8IUyup0 // via @pof

1:04pm October 7th 2015 via FalconPro3

RT @kapitanpetko: Official Android authentication architecture docs (new in 6.0): https://t.co/9iOR2eZKsD

2:47pm October 6th 2015 via Twitter Web Client

Same Sh*t Different Android Browser (Insecure parsing intent URI scheme) by @rotlogix - http://t.co/lbwiByOHdK

9:40am October 5th 2015 via FalconPro3

RT @collinrm: Mobile Security News Update for October 2015 https://t.co/QuBHlLnudg <-- will return to a more regular posting interval soon!

2:45am October 5th 2015 via FalconPro3

RT @binitamshah: crEAP - Harvesting Users on Enterprise Wireless Networks : http://t.co/tn7rGkxRE5 http://t.co/Kxm6NaKRdv

2:30am October 5th 2015 via FalconPro3

RT @jcase: Looking for Android samples of the Metaforic Concealer http://t.co/7RGe5lVCf6 would greatly appreciate

5:27pm October 3rd 2015 via FalconPro3

RT @timstrazz: New release of AXMLPrinter - ability to write out AXML objects :D https://t.co/GbCko5M5JH

5:19pm October 3rd 2015 via FalconPro3

RT @NowSecureMobile: Register now! Join CEO @ahoog42 to discuss mobile trends & how they impact disclosure models https://t.co/bTLLd7QbPW https://t.co/sJiEo

8:56pm October 2nd 2015 via FalconPro3

RT @revskills: CVE-2015-5902 Doctor Seven OSX Vulnerability https://t.co/yglzGAeyo1 @trufae

7:07pm October 1st 2015 via FalconPro3

RT @jcase: smali/baksmali 2.1.0 is out, now with deodexing support for M+ ART OAT files via JesusFreke

7:07pm October 1st 2015 via FalconPro3

RT @Mobile_Sec: New Vulnerability Processing MP3/MP4 Media which affects Android 5.0 and up https://t.co/x53EEPMQHx by @jduck @ZIMPERIUM #Stagefright

2:15pm October 1st 2015 via FalconPro3

RT @AndroidPolice: The Nexus 5X And 6P Have Software-Accelerated Encryption, But The Nexus Team Says It's Better Than Hardware… http://t.co/wE8oYtKJEW

6:00am October 1st 2015 via FalconPro3