Tweets from September 2016

RT @CopperheadOS: Need to keep in mind the SELinux layer when looking at Android's seccomp policies like https://t.co/d0vu3Q0uts and https://t.co/MNreSH6p8i.

8:04pm September 30th 2016 via FalconPro3

RT @virqdroid: How to View TLS Traffic in Android’s Logs - https://t.co/k7baj4swen

12:58pm September 30th 2016 via FalconPro3

@RetroRic79 no problem if you come a bit early, I'll be around

3:40pm September 29th 2016 via Twitter for Android in reply to RetroRic79

@againsthimself @collinrm @gepeto42 register to @Uber using a @FreedomPop number, get SMS in their app. Problem solved :)

8:37am September 29th 2016 via FalconPro3 in reply to againsthimself

RT @x0rz: Google Chromium fork removing Google integration and enhancing privacy, control, and transparency https://t.co/YgXB2Cc6bJ #privacy #chrome

8:20am September 29th 2016 via FalconPro3

Reliable Third-Party Library Detection in Android and its Security Applications - [PDF] https://t.co/QZQwHjTX51

12:44pm September 27th 2016 via Twitter Web Client

RT @cryptax: @ikoz @pof the #dockerfile for the #Android #RE image is here: https://t.co/XNcdDanmvU - feel free to adapt & have fun.

7:49am September 27th 2016 via FalconPro3

RT @cryptax: I created an #Android #reverse #engineering #docker image: docker pull cryptax/android-re. Will be using it at #hack.lu workshop. Enjoy!

8:48pm September 26th 2016 via FalconPro3

RT @jdorfman: I'd you run an #opensource project and need a new logo (pro bono) let me know. It will be the same team behind this: https://t.co/FlgHUlgaMM

8:47pm September 26th 2016 via FalconPro3

RT @duo_labs: Excited to have @pof from @IOActive present our very first London office Duo Tech Talk. https://t.co/Cd1HcULJnh

5:36pm September 26th 2016 via Twitter for Android

RT @revskills: CVE-2016-7545 -- SELinux sandbox escape https://t.co/feteaIf7p1

9:56pm September 25th 2016 via FalconPro3

@againsthimself alive in #lacon2k16, still laughing with the latest @StreetFighter news... luckily I play the old SSF2X version \o/

7:11pm September 24th 2016 via Twitter for Android in reply to againsthimself

RT @docvalentine: did some fanart of my favourite character in street fighter 5 definitely the most entertainment i've gotten from th… https://t.co/LbvTWMvzU2

5:06pm September 24th 2016 via FalconPro3

RT @ihackbanme: .@jduck's talk at DerbyCon: Stagefright An Android Exploitation Case Study W/ Release of CVE-2015-3864 in Metasploit https://t.co/4XDRuvhJxM

8:02am September 24th 2016 via FalconPro3

RT @jduck: Metasploit module for CVE-2015-3864 now available! https://t.co/nOzYBRYDKJ Pull Request: https://t.co/oZAm0FVGuM

7:43am September 24th 2016 via FalconPro3

RT @Morpheus______: #dextra reverse engineering tool for #dex/#ART fully updated for #Android #N, multi-dex oat, better decompilation https://t.co/kvjYAhPtiU

8:37am September 23rd 2016 via FalconPro3

RT @IOActive: Catch @pof #hacking #superstreetfighter @IOActive #HACKSOHO Sept 29. Come eat, drink, hack & chill in London. https://t.co/G0xG7brYyf

1:49pm September 22nd 2016 via Twitter for Android

RT @Csdxw47: Saw @radareorg on Mr Robot season two finale scene!! https://t.co/8L7yaJ7J95

11:13am September 22nd 2016 via FalconPro3

RT @d_olex: Why TrustZone is more r/e friendly than System Management Mode: you easily can get all of the SMC handlers list https://t.co/T5NYnrqgUy

5:42am September 22nd 2016 via Twitter for Android

RT @IrssiProject: Irssi 0.8.20 is out. This is a security release and we URGE our users to read and RT this link: https://t.co/g0yJs29vku - thank you!

5:15am September 22nd 2016 via FalconPro3

RT @atrox_at: Today at #Raid2016 I presented our work on carrier side IMSI Catcher / Stingray detection https://t.co/1n1tr50KSp https://t.co/hQn5Ib2txX

7:23pm September 21st 2016 via FalconPro3

RT @collinrm: Mobile Security News Update September 2016 https://t.co/MdOLylrvw2 <-- Very Android Heavy

7:58pm September 20th 2016 via FalconPro3

RT @mwrlabs: Just published @trotmaster99's Android Premium SMS warning manipulation vuln advisory: https://t.co/USJPfD15yk

7:57pm September 20th 2016 via FalconPro3

RT @IOActive: @IOActive #HACKSOHO is 29/9 at the London Happy Hacker House. Food, music, video game hacking, oh my. Register today https://t.co/G0xG7brYyf

7:56pm September 20th 2016 via FalconPro3

RT @keen_lab: We pwned Tesla Model S remotely (no physical contact) with a complex exploit chain. All details reported to Tesla. https://t.co/0qtBM2sSKW

5:50am September 20th 2016 via FalconPro3

RT @doriancussen: Updated notes on Android kernel permissions https://t.co/KVw61JLVXG #AndroidDev

5:50am September 20th 2016 via FalconPro3

RT @xdadevelopers: AutoMagisk - Automatically disable Magisk's root when certain apps are running - https://t.co/2pJyxAl9oe https://t.co/gQpa1Wty0q

7:10pm September 19th 2016 via FalconPro3

RT @opexxx: ipinfo - Searches various online resources to try and get as much info about an IP/domain as p... https://t.co/LCUxgTYVim — Python OSS (o…

6:50am September 18th 2016 via FalconPro3

RT @NCCGroupplc: Blog post: Introducing BLESuite & BLE-Replay: Python Tools for Rapid Assessment of Bluetooth Low Energy Peripherals https://t.co/0b8VaxLnHe

7:56pm September 17th 2016 via FalconPro3

RT @ChainfireXDA: SuperSU v2.78 SR1 (BETA) released - https://t.co/6eJIvKsPGo

7:52pm September 17th 2016 via FalconPro3

I'll talk about Reversing Super Street Fighter 2X at @IOActive #HACKSOHO on Sep 29. RSVP at https://t.co/ZdnaOBPLO3 https://t.co/8UnZLqc2jY

12:50pm September 15th 2016 via Twitter Web Client

RT @k3170Makan: Check out fellow @IOActive pirate @pof demonstrating how to reverse engineer classic arcade games at #HACKSOHO https://t.co/jwTxq3nGAc

12:02pm September 15th 2016 via Twitter for Android

RT @revskills: Android: racy getpidcon usage permits binder service replacement https://t.co/0LODV2eNYk

5:46am September 15th 2016 via FalconPro3

RT @thijs_br: Reverse Engineering Xiaomi’s Analytics app | https://t.co/zR2vvjuJKK

5:44am September 15th 2016 via FalconPro3

RT @evilsocket: working on AndroSwat, a tool to inspect, dump, modify, search and inject libraries into Android processes https://t.co/S3goDqQ68V

5:41am September 15th 2016 via FalconPro3

RT @natashenka: @jduck 1) Nope, not allowed 2) We'll look into it, thanks 😟

7:31pm September 13th 2016 via FalconPro3

RT @jduck: . @natashenka couple of questions... 1) what about attack via rogue BTS/eNodeB (physical proximity required)? 2) what about TMO AUP?

7:30pm September 13th 2016 via FalconPro3

RT @natashenka: Pleased to announce the Project Zero Prize. 200k prize for Android remote! https://t.co/QhS6JYHkK6

7:29pm September 13th 2016 via FalconPro3

RT @jcase: Project zero drops an android bug a month b4 google could patch the Nexus devices. Love the "no special treatment" https://t.co/2vUP2mjR9x

7:28pm September 13th 2016 via FalconPro3

RT @onceuponanop: If you want free Android kernel 0days, just track Qualcomm's QuIC disclosures. They drop a couple every month: https://t.co/WZckma9D3B

7:27pm September 13th 2016 via FalconPro3

@darkslay3rz autofire detection is only enabled for Super Street Fighter 2X, has never been enabled for RBS. Haters gonna hate anyway.

7:49am September 13th 2016 via FalconPro3 in reply to darkslay3rz

@calil_bfr i usually idle in @FightCade's #ssf2xj room. If someone mentions me I always do a few games when I'm available :)

6:57am September 13th 2016 via FalconPro3 in reply to calil_bfr

Capcom CPS2 Security Programming Guide - https://t.co/emzTnKNBYA thanks @edcrossed, @idcAvalaunch et al. for the awesome reversing job!

6:43am September 13th 2016 via Twitter Web Client

RT @marcus32x: talk shit and meet me at the ATM for a ft10 https://t.co/Pj2MpFQF8s

2:22am September 11th 2016 via FalconPro3

@mountainmanjed cool, honestly i never looked into CPS3 stuff... but will probably check it out to add support to @radareorg too :)

7:34pm September 10th 2016 via Twitter Web Client in reply to mountainmanjed

@KDav3s bueno, pues 2x en FightCade me sirve :)

7:31pm September 10th 2016 via Twitter for Android in reply to KDav3s

@angealbertini maybe the ones that contain a video got duplicated when converting to pdf :/

7:24pm September 10th 2016 via Twitter for Android in reply to angealbertini

Hacking Street Fighter: CPS2 Encryption in Radare2 at #r2con Slides: [PDF] https://t.co/ZcAxzsKM4M Video: https://t.co/gT89YFbphN

7:07pm September 10th 2016 via Twitter Web Client

RT @r2gif: Amazing presentation from @pof about decrypting, patching, repacking and playing a hacked version of Street Fighter at #r2con !

5:41pm September 10th 2016 via Twitter for Android

RT @as0ler: Enjoying how @pof hack & play street fighter II using @radareorg at #r2con https://t.co/UsYwD5gdrd

5:41pm September 10th 2016 via Twitter for Android

RT @DEYCrypt: Hacking Street Fighter : CPS2 Encryption in radare2 by @pof at #r2con @radareorg https://t.co/eX19WWLpk8

5:40pm September 10th 2016 via Twitter for Android

RT @reyammer: My @IEEESSP S&P'16 talk on detecting logic bombs in Android apps is out! Check it out here: https://t.co/xd5TnfIZ1e

6:36am September 10th 2016 via FalconPro3

RT @radareorg: The slides for the #r2con “Radare from A to Z” slides are now online https://t.co/mYWMHdDlE7

5:51am September 9th 2016 via FalconPro3

RT @luanderock: Samsung Android Security Updates for September: https://t.co/DpP12N0h8B

5:51am September 9th 2016 via FalconPro3

RT @kapitanpetko: Official documentation about Android 7's file-based encryption (FBE) https://t.co/o7nOFC8wZw

5:49am September 9th 2016 via FalconPro3

RT @ProjectZeroBugs: Android - libutils UTF16 to UTF8 conversion heap-buffer-overflow https://t.co/h1PVEPJgD2

7:55am September 8th 2016 via FalconPro3

RT @claud_xiao: There was an issue of libjhead crash on Android: https://t.co/bIDb26KWVy No idea whether it's related with CVE-2016-3862 @timstrazz

5:37am September 8th 2016 via FalconPro3

RT @maldr0id: Interesting and very detailed survey about the ELF based #Android #malware https://t.co/hTFABMIVW4

5:31am September 8th 2016 via FalconPro3

RT @benhawkes: Project Zero blog: "Return to libstagefright: exploiting libutils on Android" by Mark Brand - https://t.co/rFZOsRq8mj

5:18am September 8th 2016 via FalconPro3

RT @chengjia4574: @ScottyBauer1 @sagikedmi @fisher_the_cell I put the poc of cve-2016-3866 in github https://t.co/0f1NEUrWqx cause it had been disclosed

10:55pm September 7th 2016 via FalconPro3

Keeping Android safe: Security enhancements in Nougat - https://t.co/cTEE99ThMs

7:29am September 7th 2016 via FalconPro3

RT @anestisb: Seems that Google is preparing another DEX based meta file container named VDEX - https://t.co/9RZ5wrEHDN

7:27am September 7th 2016 via FalconPro3

RT @kapitanpetko: Android APK v2 signature method, looks much better than JAR: https://t.co/RMNCP7qjFi

7:24am September 7th 2016 via FalconPro3

RT @jduck: Factory and OTA Images for the September Android Security Bulletin have been added to https://t.co/7KXbTP2gxX Enjoy!

7:21am September 7th 2016 via FalconPro3

RT @ProjectZeroBugs: Android: debuggerd mitigation bypass and infoleak https://t.co/GDuj15QM9v

7:21am September 7th 2016 via FalconPro3

RT @timstrazz: Here is the commit that killed all the bugs; TLDR replace c code with java code :D https://t.co/fYXahlNrO1

7:19am September 7th 2016 via FalconPro3

RT @timstrazz: Security Bulletin seems up now https://t.co/O7dfYu5Je1 with some details on CVE-2016-3862 :D

7:14am September 7th 2016 via FalconPro3

RT @CopperheadOS: @4Dgifts The recent Linux Security Summit presentation goes into a fair bit of depth on attack surface reduction: https://t.co/W4Is49cSt5.

7:11am September 7th 2016 via FalconPro3

RT @4Dgifts: Android Bootcamp 2016. "Defense in depth efforts" presentation (header may not be correct) https://t.co/m8aASk3HpF https://t.co/1AIOpRlSrC

7:10am September 7th 2016 via FalconPro3

RT @4Dgifts: This SafetyNet presentation from Android Security bootcamp is worth a read https://t.co/bkdUabp5hD https://t.co/eIeAoak73E

7:07am September 7th 2016 via FalconPro3

@benhawkes @laginimaineb congrats! looking forward to see more awesome stuff from you :)

7:00am September 7th 2016 via FalconPro3 in reply to benhawkes

RT @thezdi: Announcing #Mobile #Pwn2Own 2016! Details and info now available. https://t.co/QqDGv0WLlV. Complete rules at https://t.co/8xYBO9MZdR #MP2O

6:54am September 7th 2016 via FalconPro3

@idcAvalaunch noo... i only own a couple of 2X boards, not much into other games :D

2:53pm September 6th 2016 via Twitter for Android in reply to idcAvalaunch

@idcAvalaunch that is my friend Rocco, owner of the boards :)

2:49pm September 6th 2016 via Twitter for Android in reply to idcAvalaunch

Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis - [PDF] https://t.co/NkUNyWg2y3

9:00am September 6th 2016 via Twitter Web Client

@therealundamned those are from a friend who bought them on a pack from JP. One AvP is already sold and a black HSF2 joined the collection

12:23am September 5th 2016 via FalconPro3 in reply to therealundamned

RT @ChainfireXDA: suhide v0.16 - more fixes - better hiding on Nougat - https://t.co/3yNPUEg03Y

12:09am September 5th 2016 via FalconPro3

RT @raviborgaonkar: Parse Qualcomm DIAG format and convert 2G, 3G n 4G messages to GSMTAP for analysis in wireshark , from @zecke42 https://t.co/eTpH6iMOVw

7:33pm September 4th 2016 via Twitter for Android

RT @radareorg: Get ready for the congress! Published #r2con talk descriptions! (not just the titles) https://t.co/qhSMxfrKUX

9:55pm September 3rd 2016 via Twitter for Android

@brookgamingfans it's a Super Street Fighter II X, original CPS-2 arcade A+B board Japanese version.

8:34pm September 3rd 2016 via FalconPro3 in reply to brookgamingfans

RT @ikoz: Ever wondered how suhide works? My quick writeup: https://t.co/12RljXq7zV https://t.co/LUnX7TnGVr

8:10pm September 3rd 2016 via FalconPro3

RT @ChainfireXDA: suhide updated to v0.12 - fixes galore - https://t.co/aWR5wwFFxY

8:09pm September 3rd 2016 via FalconPro3

RT @jebdec: We are also publishing our intern's Android lib code matching plugin for JEB, https://t.co/WiWmq927Yx @UncleCat8 https://t.co/1NvM0zv1AD

8:08pm September 3rd 2016 via FalconPro3