Tweets from December 2015

qemu-trustzone: Experimental QEMU version w/ basic support for ARM TrustZone (security extensions) - https://t.co/9cLBwEb9Ie via @insitusec

12:34pm December 31st 2015 via Twitter Web Client

RT @binitamshah: An experiment in porting the Android init system to GNU/Linux : https://t.co/aj53kvnqJM

11:42am December 31st 2015 via FalconPro3

RT @NowSecureMobile: .@UdayanKumar introduces our dynamic analysis system and highlights issues it identifies https://t.co/zv9pSvv8OO https://t.co/7esjCbpgBN

8:05am December 30th 2015 via FalconPro3

RT @NowSecureMobile: Great to see the Android VTS being used to measure the pulse of security on Android https://t.co/Ttd9g4dP1c

8:05am December 30th 2015 via FalconPro3

RT @andremoulu: How to not disable SELinux on Android - https://t.co/zoZ9Cmtgrw

9:40pm December 27th 2015 via FalconPro3

@cheat_we was removed from Google play, source is still on github: https://t.co/6SqGMetxnQ

8:14pm December 27th 2015 via FalconPro3 in reply to cheat_we

@BoobleBobble looks awesome, thanks so much! I will reply to your github issue as soon as I get in front of a computer.

8:05am December 27th 2015 via FalconPro3 in reply to BoobleBobble

RT @timstrazz: VisUAL a highly visual ARM emulator https://t.co/fJJLS4s2iO < looks pretty bad ass

8:24pm December 25th 2015 via FalconPro3

RT @radareorg: HO HO HO r2santa delivers as promised! https://t.co/6CqzXW2hO7

2:54am December 25th 2015 via FalconPro3

RT @collinrm: Mobile Security News Update December 2015 https://t.co/98Pm71faRj … Merry X-Mas everybody!

1:48pm December 24th 2015 via FalconPro3

RT @collinrm: Nice list of Android tools to detect fake mobile towers! https://t.co/d9wiEu8Qvu

1:48pm December 24th 2015 via FalconPro3

RT @NowSecureMobile: Check out this week's #MobSec5, our weekly round-up of the #MobileSecurity news that matters https://t.co/MWJiz9ZYCD https://t.co/vHKmLQNaT

10:18am December 24th 2015 via FalconPro3

RT @reyammer: 301, actually! :-) Secure replacement for DexClassLoader: Android devs, check it out!! PDF: https://t.co/UB9kjgGHbl https://t.co/GB87jEITpu

10:17am December 24th 2015 via FalconPro3

RT @andremoulu: Exploring Android's SELinux Kernel Policy by @_kamino_ of @ge0n0sis https://t.co/Hl7jurHxDj

10:11am December 24th 2015 via FalconPro3

RT @newsycombinator: Android NDK: GCC is now deprecated, everyone should be switching to Clang https://t.co/1icv4Y6nMT

10:10am December 24th 2015 via FalconPro3

RT @timstrazz: Android CVE-2015-6620 POC and explanation https://t.co/5JtNzNKKXw

5:47am December 22nd 2015 via FalconPro3

RT @RSAConference: This #RSAC video has most views on our YouTube channel: "Beginners Guide to Reverse Engineering Android Apps" @pof https://t.co/UF8omEjpDr

3:04pm December 18th 2015 via FalconPro3

RT @Fuzion24: CVE-2016-6619/ANDROID-23520714 https://t.co/zNxBln4kqa A logic kernel bug that can be exploited for root? https://t.co/WBxN1gtmnA

10:08pm December 17th 2015 via FalconPro3

RT @iamnion: seems Samsung patched the baseband bug we have been using for owning the S6 edge at #pwn2own. 1 month, not bad https://t.co/ss4YSwTDWm

9:55pm December 17th 2015 via FalconPro3

RT @kutyacica: Seems like Samsung patched (some part of) our Pwn2Own vuln! Will have to look into it to see if it's any good. https://t.co/s81mAmVS6Q

9:54pm December 17th 2015 via FalconPro3

RT @AndroidDev: Learn how Netflix users sign in on #Android without entering passwords using Smart Lock https://t.co/1JhmJvgq7k

9:48pm December 17th 2015 via FalconPro3

RT @4Dgifts: "ICrypto.cpp: ASLR bypass using DECRYPT IPC" (CVE-2015-6628) Fixed in Android Security Bulletin December 2015 https://t.co/AfTvjknrxq

6:53am December 17th 2015 via FalconPro3

RT @4Dgifts: This is the infoleak in Android stagefright library (CVE-2015-6631) found by @xeroxnir .Fixed in the December patch https://t.co/h1LHLdn1bL

6:53am December 17th 2015 via FalconPro3

RT @AndreaBarisani: Nice article from @GenodeLabs : "The story behind Genode's TrustZone demo on the USB armory" https://t.co/0VEVZ07Gdj

6:47am December 17th 2015 via FalconPro3

RT @ChainfireXDA: Beware modifying /system files on 6.0, free space is not what it seems - https://t.co/maEXHAtMSz

9:10pm December 16th 2015 via FalconPro3

RT @Mobile_Sec: Adrian Ludwig's BLACKHAT USA 2015 Presentation: "Android Security State of the Union" https://t.co/kIXYw4nQM8 Video: https://t.co/qgNdg9QKlx

9:07pm December 16th 2015 via FalconPro3

RT @Mobile_Sec: Using "system" privileges by abusing mobile remote support tools (mRST) Video: https://t.co/27IrQ0bVCR Slides: https://t.co/vS5X0PCwW4

9:06pm December 16th 2015 via FalconPro3

RT @PaulOBrien: I didn’t know Android had a notification log! #TIL https://t.co/rxa2ztbfcZ

4:13pm December 15th 2015 via FalconPro3

RT @reyammer: [Release] BareDroid, a system to scalably analyze Android apps on real devices! PDF: https://t.co/cvmU5EPml5 Code: https://t.co/Fj8omogXXH

8:29am December 15th 2015 via Twitter Web Client

RT @c3c: Reverse engineering Android APK 2 writeup https://t.co/I8ftDy773A for the SECCON 2015 CTF /cc @secconctf

8:06am December 15th 2015 via FalconPro3

RT @oldfresher: Release a PoC for a write-what-where plus heap address leaking vulnerability in Android OMX https://t.co/REE9VBhNPj

7:42am December 15th 2015 via FalconPro3

RT @CTurtE: PS4 kernel exploit tease (root FS dump, and list of PIDs): https://t.co/oBcT1iQoep

7:38am December 15th 2015 via FalconPro3

RT @CTurtE: Can successfully dump RAM from other processes (like SceShellUI) using ptrace! Next step: patching RAM...

7:38am December 15th 2015 via FalconPro3

RT @CTurtE: Just broke WebKit process out of a FreeBSD jail (cred->cr_prison = &prison0). Guess you could say the PS4 is now officially "jailbroken" :P

7:37am December 15th 2015 via FalconPro3

RT @jcase: Qcom + HTC exploits we disclosed forgot to open source https://t.co/dqFs9WpIV4 https://t.co/vXEXZVSEhT cc: @timstrazz @caleb_fenton

11:52am December 14th 2015 via FalconPro3

RT @kapitanpetko: TIL: Apparently if install an accessibility service, FDE password is reset to default on Android 5.x+. https://t.co/z9gRzg6DZ0

11:49am December 14th 2015 via FalconPro3

RT @CopperheadSec: Landed -fstack-protector-strong in AOSP: https://t.co/fmufEMT33q. It's possible it will get reverted, but no problems have come up yet.

8:13am December 14th 2015 via FalconPro3

RT @xdadevelopers: Chainfire's systemless root now supports boot image patching! - https://t.co/xokWP2LVd2 https://t.co/zXDo0GDLiA

9:58pm December 13th 2015 via FalconPro3

How to test USB C to USB A cables on Nexus 5X/6P: https://t.co/4AtDt4bWuh And 'CheckR', an app that does it for you: https://t.co/KNestAhgmg

10:26am December 13th 2015 via Twitter Web Client

RT @dyngnosis: Sldies, Paper and source code explains the process of going from JTAG -> root on a device https://t.co/hMj9LwFCxi - @securelyfitz @joegrand

10:27pm December 12th 2015 via FalconPro3

RT @caleb_fenton: Getting capstone running on android, "Capstone Engine on Android" https://t.co/0Z3caJBjPM cc @g0blinResearch @capstone_engine

10:25pm December 12th 2015 via FalconPro3

RT @Technologeeks: Slides from #andevcon #binder #internals talk -https://t.co/n0VqTiALNO - excerpt from Android Internals Volume 2! https://t.co/NHORtXIDi7

9:56pm December 12th 2015 via FalconPro3

RT @pulsoid: @esanfelix @pof I would also like to see clarified that TEE != TZ. TZ provides the HW primitives for a TEE, but not all TEEs are TZ-based.

5:35pm December 11th 2015 via FalconPro3

RT @esanfelix: @pof btw i think as a group we need to start saying qsee/X os vulns rather than tz vulns, since tz itself is not at fault most of the time

5:35pm December 11th 2015 via FalconPro3

@esanfelix true, most of the public exploits are in Qualcomm (QSEE), or OEM specific code (HTC, Motorola...) but not in TrustZone itself.

1:36pm December 11th 2015 via Twitter for Android in reply to esanfelix

@esanfelix not yet, I've added a short explanation of the "TRUSTNONE" bug from beaups: https://t.co/027lh2IIy1

1:02pm December 11th 2015 via Twitter for Android in reply to esanfelix

RT @radareorg: You can register to the hackaton here: https://t.co/bKKjraHCUj there's still room for more participants!

5:58pm December 7th 2015 via Twitter for Android

RT @timstrazz: Dex extractor from Oat files https://t.co/P9bOk8ILqC - bonus good png of structure for an OAT https://t.co/6cJNZ9bG05

3:26am December 7th 2015 via FalconPro3

RT @raviborgaonkar: New data residue attacks on Android and data residue vulnerabilities https://t.co/MkqELnFjvb

3:24am December 7th 2015 via FalconPro3

RT @timstrazz: Android-classyshark for looking at Android APKs/decompiling https://t.co/SefqszpN7v

3:15am December 7th 2015 via FalconPro3

RT @Technologeeks: DEXTRA (#DEX/#ART #reversing tool) - https://t.co/hs250wZydO … now with full M support, and improved #decompilation https://t.co/EhMdT33oA6

8:40am December 2nd 2015 via FalconPro3