Tweets from October 2016

RT @CopperheadOS: @Jockular rowhammer is mitigated to a large extent by LPDDR4 with the optional TRR feature. It's in the Nexus 6P, Pixel and Pixel XL.

11:36am October 31st 2016 via FalconPro3

RT @CopperheadOS: @Jockular DirtyCow is simply a Linux kernel vulnerability. Sandboxing can help. It's patched in CopperheadOS, but BlackBerry hasn't done it.

11:36am October 31st 2016 via FalconPro3

RT @AndreaBarisani: My initial thoughts on ARM TrustZone susceptibility Drammer (ARM Rowhammer) attacks: https://t.co/8D43AuS2Xv

6:53pm October 24th 2016 via FalconPro3

RT @reyammer: Our work with the @vu5ec folks goes finally public! Drammer: rowhammer on Android ~> root ~> <drop mic>. All info: https://t.co/fAvhWX

6:51pm October 24th 2016 via FalconPro3

RT @dangoodin001: Using Rowhammer bitflips to root Android phones is now a thing https://t.co/YD84rLNZcD

6:44pm October 24th 2016 via FalconPro3

RT @PwnieAwards: The Pwnie Awards 2016 ceremony video has escaped the ranch and found its way onto YouTube: https://t.co/B4OK1DNTVU

6:44pm October 24th 2016 via FalconPro3

RT @ikoz: Bypassing SafetyNet using kernel mod to block verifiedboot reporting. In-kernel safetynet and hardware attestation… https://t.co/zXnoBPNHUv

6:44pm October 24th 2016 via FalconPro3

RT @trailofbits: "The @trailofbits blog has a fantastic and detailed overview of control-flow integrity in Clang" Thanks @llvmweekly! https://t.co/MWTixlPapw

6:41pm October 24th 2016 via Twitter for Android

RT @rantyben: Slides from my @kiwicon talk "The Art of Fuzzing Without Fuzzing" aka "A Love Letter to @lcamtuf" https://t.co/i2GgE57Ub0

6:39pm October 24th 2016 via FalconPro3

RT @Morpheus______: It never ends ... But - #dextra catches up again - updated to support #art 030 #oat 088 from #Android 7.1.. https://t.co/i3FDpkuvFO

6:28pm October 24th 2016 via FalconPro3

RT @AndroidTamer: DirtyCow CVE-2016-5195: Android PoC: https://t.co/iGmrrAeoOe

6:21pm October 24th 2016 via FalconPro3

RT @radareorg: Exploiting the Dirty Cow vulnerability on Android devices with radare2 https://t.co/8al2GwOxgQ by @NowSecureMobile… https://t.co/qTnr98lplI

1:42pm October 22nd 2016 via FalconPro3

RT @jcase: Nexus line will no longer qualify for Android Security Rewards on December 31st 2016, burn your bugs.

1:41pm October 22nd 2016 via FalconPro3

RT @thomas_coseinc: USD700,000 for Android Chrome RCE+SBX(persistent). Register now at https://t.co/WnOrtrp1jR

3:13pm October 21st 2016 via FalconPro3

RT @jeffvanderstoep: @jcase @RootJunky I would recommend leaving one as-is, and switching your active slot to the one just flashed. "fastboot --set-active=_a"

6:51am October 21st 2016 via FalconPro3

RT @jeffvanderstoep: @RootJunky @jcase "fastboot flash --slot _a boot; fastboot flash --slot _b boot"

8:10pm October 20th 2016 via FalconPro3

RT @Technologeeks: @Morpheus______ 's presentation from #codeblue_jp on #ARM #TrustZone #ELx for whomever is interested:… https://t.co/qbWDLBDg0H

7:43pm October 20th 2016 via FalconPro3

RT @CopperheadOS: @collinrm @dinodaizovi They could use attestation via TrustZone, but they probably aren't doing something like that yet. Maybe they will.

4:06am October 20th 2016 via FalconPro3

RT @CopperheadOS: @collinrm @dinodaizovi It wouldn't be surprising if they were simply checking the verified boot state property right now. Easy to fake...

4:06am October 20th 2016 via FalconPro3

RT @CopperheadOS: @collinrm @dinodaizovi Disabling verified boot for boot/recovery is just one of the things that an unlocked bootloader does.

4:06am October 20th 2016 via FalconPro3

RT @CopperheadOS: @collinrm @dinodaizovi It's probably really tied to verified boot state, not the bootloader being locked. Doubt it impacts old devices.

4:06am October 20th 2016 via FalconPro3

RT @ikoz: Certificate Pinning for mobile apps: what developers and architects need to know. My @AppSecEU slides: https://t.co/C4MU27YEKy

3:59am October 20th 2016 via FalconPro3

RT @jeffvanderstoep: Some great system-hardening work in-progress in AOSP: @rsesek's project to further isolate webviews: https://t.co/2l4hPXNy9K

7:20am October 19th 2016 via FalconPro3

RT @CopperheadOS: Android Nougat isn't really offering "file-based encryption" anyway. It's ext4 encryption with per-directory keys, rather than dm-crypt.

7:15am October 19th 2016 via FalconPro3

RT @dotMudge: This is a great blog post about applied CFI on OSX/Linux. Let’s talk about CFI: clang edition | Trail of Bits Blog https://t.co/E1x1NJfjXM

7:55pm October 18th 2016 via FalconPro3

RT @collinrm: Mobile Security News Update October 2016 https://t.co/dj821gf5Op OMG so many pics!

7:54pm October 18th 2016 via FalconPro3

RT @msuiche: Have you guys heard of compiler bombs ? 4GB output with 1 line of C code ? https://t.co/t8K5VP1TBg

7:40pm October 15th 2016 via FalconPro3

RT @addelindh: RCE as root on ChromeOS via a single byte write - impressive stuff https://t.co/ikJgyKalGs

12:41pm October 15th 2016 via FalconPro3

RT @CopperheadOS: And for SELinux, https://t.co/NHHWzosl2z + https://t.co/K7HWouPnvN (relevant domains are directly named after the services). @securepaul

12:11pm October 15th 2016 via FalconPro3

RT @CopperheadOS: The current seccomp-bpf policies (via minijail) are at https://t.co/dJ3l64LP6j and https://t.co/bmpKdmzURJ. Just those two ATM. @securepaul

12:11pm October 15th 2016 via FalconPro3

RT @CopperheadOS: For the mediaserver split / isolation with SELinux/seccomp-bpf, https://t.co/ORxP5tV5J4 is a nice overview of the current state. @securepaul

12:11pm October 15th 2016 via FalconPro3

RT @danigargu: I just released my web fuzzer (urlfuzz) written in NodeJS https://t.co/QbEgNbxwLu

7:35pm October 14th 2016 via FalconPro3

@quetzal son cps2, el hardware original de la màquina recreativa

12:56pm October 14th 2016 via FalconPro3 in reply to quetzal

RT @jcase: Pork Explosion: A Foxconn Bootloader Root/SELinux Backdoor https://t.co/Xw2CN85QeR Many thanks to @nextbitsys for promptly fixing this!

1:51pm October 13th 2016 via FalconPro3

RT @returnsme: Our slides for CVE-2015-1805 exploit & Samsung Knox(S6 ver.) bypassing at MOSEC2016, is now available. https://t.co/IdkI60Cx49 @keen_lab

8:53am October 12th 2016 via FalconPro3

RT @ikoz: Here's @pof hacking street fighter at @duo_labs first London event https://t.co/Dx0EO1VEfd

10:10pm October 11th 2016 via Twitter for Android

RT @duo_labs: Huge thank you to @pof from @IOActive for presenting at our very first London Tech Talk. Also thanks to those that came!! #duotechtalk

9:34pm October 11th 2016 via Twitter for Android

RT @duosec: #DuoTechTalk #London - 11 Oct. "Reverse Engineering a Classic Arcade Game: Super Street Fighter 2X" w/@pof:… https://t.co/yxsFxM9gSe

9:35am October 10th 2016 via Twitter for Android

@Carlbozal gracias! seguro que si, tuve mucha suerte y faltó gente muy buena

9:34am October 10th 2016 via Twitter for Android in reply to Carlbozal

RT @xjamesmorris: Here are the slides from my #linuxcon eu talk on Linux Kernel Security - https://t.co/BlMNSzcBjb

4:23am October 8th 2016 via FalconPro3

@csahuqui no hombre, aquí jugamos con el juego original de recreativa :-) Si todo va bien el torneo del domingo será en una Astro City :-)

8:13pm October 7th 2016 via Twitter for Android in reply to csahuqui

Everything ready for Super Street Fighter II Turbo at #retrobarcelona, if you're around come and throw some hadoken… https://t.co/krNAdyqsKN

7:19pm October 7th 2016 via Twitter for Android

RT @IOActive: Don't miss @IOActive's @pof #ReverseEngineering Super Streetfigher at @duo_labs's London Tech Talk next Tues. https://t.co/7dG3bIFQTR

3:20pm October 7th 2016 via FalconPro3

RT @duosec: Join us for our first #London #DuoTechTalk - 11 Oct w/ @pof on how to reverse engineer a classic Capcom arcade game… https://t.co/yWOIe1RZN3

3:20pm October 7th 2016 via FalconPro3

RT @raviborgaonkar: CCS workshop program on mobile security https://t.co/4pcuN2JiIq -We present impact of NITZ protocol on basebands/OS n info on CVE-2016-3831.

5:22pm October 6th 2016 via FalconPro3

RT @zeewox: Amlogic S905 SoC: bypassing the (not so) SecureBoot to dump the BootROM https://t.co/ArIC2iV9g9 #ARM #firmware #trustzone #security @cnxsoft

9:45am October 6th 2016 via FalconPro3

RT @timstrazz: Android full-disk encryption: a security assessment from Oliver Kunz https://t.co/tnNS9kY4xi < Excellent and up to date FDE doc (PDF)

6:12am October 5th 2016 via FalconPro3

RT @timstrazz: This might help people poking at the cryptfs stuff on Android... Helped me since nothing else seemed up to date? https://t.co/gVUN2Clabc

6:07am October 5th 2016 via FalconPro3

RT @kutyacica: 🤔 Google/Qualcomm policy on publishing QC internal proprietary findings... is what now? @againsthimself @ebeip90 https://t.co/GxBUUdoikl

10:36pm October 4th 2016 via FalconPro3

RT @AndroidTamer: next instalment of Google security updated : https://t.co/NtK7bpDZEv Look for october 1 or october 5 patch status.

9:01pm October 4th 2016 via FalconPro3

RT @jcase: Pixel phones also do not have the traditional recovery partition, recovery mostly unused and is inside boot.img like some OEMs

8:15pm October 4th 2016 via FalconPro3

RT @WiredUK: A security flaw in Samsung Knox allowed 'full control' of phones https://t.co/Vboo9Iu4Ta https://t.co/IK0tFVjPcm

8:12pm October 4th 2016 via FalconPro3

RT @jonoberheide: First details I've seen on the Android container/sandboxing on CrOS via minijail: https://t.co/EHtFRnUKd1 /cc… https://t.co/k9fNXT7F39

8:07pm October 4th 2016 via FalconPro3

RT @ScottyBauer1: Android PoCs for October bulletin: CVE-2015-0572 CVE-2016-3902 CVE-2016-3928 CVE-2016-3936 CVE-2016-3937 https://t.co/L1Nnx6hVt8

7:56pm October 3rd 2016 via FalconPro3

RT @t436h05t: @timstrazz @jcase @pof Android Xposed Mod Reversing/Logging Application. https://t.co/50MX71o0xS

7:51pm October 1st 2016 via Twitter for Android