Tweets from January 2017

RT @arw: Update on the groovy things the Google Vulnerability Rewards Programs have been up to! https://t.co/WFLC4THbNr

7:49pm January 30th 2017 via FalconPro3

RT @ProjectZeroBugs: Android: RKP privilege escalation via unprotected MSRs in EL1 to memory management control registers https://t.co/0AYReGx6Wy

7:34pm January 30th 2017 via FalconPro3

RT @ProjectZeroBugs: Android: RKP Memory Corruption in "cfp_ropp_new_key_reenc" and "cfp_ropp_new_key" https://t.co/oRX2Ez7t8J

7:34pm January 30th 2017 via FalconPro3

RT @kapitanpetko: Basic Android aboot image parser/signature verification script https://t.co/8aqgpZGlmj (based on recent Qualcomm whitepaper)

7:17pm January 30th 2017 via FalconPro3

RT @AndroidTamer: Tracking Android Security Updates across devices : Call for data : https://t.co/BOvqqQPalb : Please RT and please contribute.

8:37pm January 29th 2017 via FalconPro3

RT @muellerberndt: #OWASP Mobile Crackmes and #Reversing Tutorials Announced https://t.co/JGQfw0XWYB

8:21pm January 29th 2017 via FalconPro3

RT @vuldb: Samsung KNOX 1.0 eCryptFS Key Generator weak encryption https://t.co/8Goi3Zl86c

8:20pm January 29th 2017 via FalconPro3

RT @egyp7: Metasploit Weekly Wrapup! https://t.co/XWHSGdDR9J Updates for Mettle, Android LPE, some fun commands, mimikatz v2.1 and more!

8:13pm January 29th 2017 via FalconPro3

RT @FightCade: Join us in the first FightCade Offline Festival, May 26-28 in Spain: https://t.co/3zilgmiH3f + More surprises comi… https://t.co/3e56Rf3CNt

12:37am January 29th 2017 via Twitter Web Client

RT @jeffvanderstoep: World readable unix permissions in debugfs :( Access to these files is already disallowed in Android N+ by selinux.… https://t.co/61P7SvH

5:21am January 28th 2017 via FalconPro3

RT @cryptax: I've archived some of my former #CTF #challenges at https://t.co/YIOGvBc65t - beware of the #spoiler directories. Mainly #Android stuff.

5:14am January 28th 2017 via FalconPro3

RT @ProjectZeroBugs: Android: KASLR bypass in "pm_qos" https://t.co/ubBFsQOLFc

5:08am January 28th 2017 via FalconPro3

RT @ProjectZeroBugs: Android: RKP Memory Corruption in "rkp_mark_adbd" https://t.co/NyLZgApkux

4:42am January 28th 2017 via FalconPro3

RT @shellphish: Curious about the @mechanicalphish? Our #Phrack article just went live! https://t.co/J2grN9uu26

4:28am January 28th 2017 via FalconPro3

RT @muellerberndt: #OWASP is writing an open standard and testing guide for #mobile #appsec. Be part of it https://t.co/2CVXlwMEkI https://t.co/2FZNqflYoF

4:23am January 28th 2017 via FalconPro3

RT @binitamshah: An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps : https://t.co/x6Z5VPbZNi (pdf)

4:22am January 28th 2017 via FalconPro3

RT @virqdroid: Cracking Android pattern lock in five attempts https://t.co/aRA5jr1W9h https://t.co/bFULGHhn7x #NDSS17

4:20am January 28th 2017 via FalconPro3

RT @AndroidPolice: Google shuts off Chrome Sync API for third-party browsers on Android, citing a security vulnerability… https://t.co/NVtjAOM6sB

8:00pm January 27th 2017 via FalconPro3

RT @collinrm: Mobile Security News Update January 2017: https://t.co/dZiEQmp2Tu #Android

7:58pm January 27th 2017 via FalconPro3

RT @isoiphone: git commit -m "fixed issue with fan" https://t.co/pckLms3VqU

6:21pm January 27th 2017 via FalconPro3

RT @revskills: WAP in 2017.. SMS Vuln in Samsung Galaxy https://t.co/u7rLJFvJUb

8:18pm January 26th 2017 via FalconPro3

RT @xdadevelopers: Google has launched a new Android security page for developers - https://t.co/YUs4ETOa5J https://t.co/kSlUEAXEUa

8:48pm January 25th 2017 via FalconPro3

@therealundamned a black darksoft multi-kit UD-CPS2 would be awesome :)

9:13pm January 24th 2017 via FalconPro3 in reply to therealundamned

RT @xdadevelopers: Deeply integrated Progressive Web Apps (WebAPKs) are now live for chrome on Android https://t.co/Lkb0PJdsGV https://t.co/eOfpkZCEtI

8:46pm January 24th 2017 via FalconPro3

@KillrMillerTime probably yes, in the end we just want a ST clone that is playable on modern TVs :P

6:42am January 23rd 2017 via FalconPro3 in reply to KillrMillerTime

RT @flanker_hqd: A theme pack got you pwned with system privilege on Huawei's EMUI? See https://t.co/Sy1Pce5TtY for vulnerability details disclosed.

8:31am January 22nd 2017 via Twitter for Android

RT @shoryukendotcom: The Problems with Ultra Street Fighter II -- From a Super Turbo Player's Standpoint https://t.co/JTeQ1gXdGV

12:32am January 22nd 2017 via Twitter for Android

RT @pamartineza: Running Android Tests on cloud devices with Jenkins CI and @Firebase @awscloud @Genymotion #AndroidDev https://t.co/wFybpoPDAy

2:06pm January 21st 2017 via FalconPro3

RT @CopperheadOS: Brillo (Android Things) defines standard hardware platforms and moves device-specific drivers into userspace apps: https://t.co/agHK6Z4eAB.

9:08pm January 19th 2017 via FalconPro3

RT @ProjectZeroBugs: Android: Multiple overflows in TSP sysfs "cmd_store" https://t.co/9roULKdU43

9:01pm January 19th 2017 via FalconPro3

RT @ProjectZeroBugs: Android: Race condition in sec_ts touchscreen sysfs interface https://t.co/HzxQNLtULa

9:01pm January 19th 2017 via FalconPro3

RT @ProjectZeroBugs: Android: Buffer overflow in "fps" sysfs entry https://t.co/a775ZkKmSU

9:01pm January 19th 2017 via FalconPro3

RT @NAKsecurity: .@Qualcomm Secure Boot & Image Authentication - in detail. Blog: https://t.co/7sHxc8Qong, FULL WHITEPAPER: https://t.co/afbnevJtsP

9:00pm January 19th 2017 via FalconPro3

RT @Mobile_Sec: Very good service to find out hardcoded secrets and keys in Android Apps: https://t.co/Fgrh50K3cY

8:20pm January 19th 2017 via FalconPro3

@MrWiz Ultra Street Fighter 2: The Final Challengers (and ST on cabinets!)

7:38pm January 18th 2017 via FalconPro3 in reply to MrWiz

RT @jacktang310: A practical method to debug android kernel with KGDB on Nexus 6P. It should works on Pixel. But I don't try :) https://t.co/hO3h6NB2Ia

5:00pm January 16th 2017 via FalconPro3

RT @andremoulu: Executing code in the TrustZone land by @embarbosa https://t.co/0nGvri6O4i

10:04am January 16th 2017 via FalconPro3

@burnoutfighter @Pichy_and_Pals you mean stored oichio still works, but stored supers don't? what about claw's flip click?

10:01pm January 15th 2017 via FalconPro3 in reply to burnoutfighter

RT @mountainmanjed: One of my friends made a python script to make cps2 graphics editing alittle easier. https://t.co/klbx50AJLd https://t.co/GtWVZvhK3n

10:17am January 15th 2017 via FalconPro3

@therealundamned is it confirmed that will be exclusive on the Switch?

4:20pm January 13th 2017 via Twitter Web Client in reply to therealundamned

RT @CopperheadOS: Serial console debug cables for Nexus (4, 7 (2012), 7 (2013), 5, 6, 9, 5X, 6P) and Pixel phones. Need to know how many are wanted ASAP.

8:32pm January 11th 2017 via FalconPro3

RT @CopperheadOS: Taking orders! DM or email team@copperhead.co https://t.co/JonMZLI0gn

8:32pm January 11th 2017 via FalconPro3

RT @muellerberndt: Solving an #Android #Crackme with a Little Symbolic Execution https://t.co/l5RmlSW13m

8:28pm January 11th 2017 via FalconPro3

RT @againsthimself: New from @acar_can: whitepaper detailing pointer authentication on ARMv8.3 https://t.co/MqjTSRdG8S

4:53am January 11th 2017 via FalconPro3

RT @Mobile_Sec: Android OTA Updates Internals https://t.co/JooqKyCFro by Andrew Boie @intel @linuxfoundation

8:33pm January 10th 2017 via FalconPro3

RT @timstrazz: Has anyone torn appart the Xiaomi "deep flash" cable and figured out wtf it is? Wondering how insecure it is... https://t.co/gLijvPZq7g

8:27pm January 10th 2017 via FalconPro3

RT @trufae: Fix for a pretty common issue with GNU readline (input line overwritten when long) echo "set horizontal-scroll-mode off" >> ~/.inputrc

9:17am January 10th 2017 via Twitter Web Client

RT @marcan42: I realized nobody knows how the Linux kernel init (initrd, initramfs, mounts, etc) works, so I rewrote it in bash: https://t.co/187drobILG

9:16am January 10th 2017 via Twitter Web Client

@arkadeum if you haven't seen that yet, i'm sure you'll enjoy it: "The Ultimate Game Boy Talk @ 33c3" https://t.co/BqQnqYm2gk

9:15am January 10th 2017 via Twitter Web Client

RT @roeehay: BootmodeChecker - is your Nexus 6/6P still vulnerable to CVE-2016-8467? https://t.co/a5vQuVrVoq https://t.co/nvd9DTFe4l

10:51pm January 9th 2017 via FalconPro3

RT @Mobile_Sec: "Android Verified Boot" presentation by Andrew Boie Video: https://t.co/r0mGGPtP0Z Slides: https://t.co/bESUlKTA1k @linuxfoundation @intel

10:45pm January 9th 2017 via FalconPro3

RT @rchiossi: AndroidXRef is looking for companies interested in sponsoring the website. Check out the notice on https://t.co/StONHM74tN

8:32pm January 9th 2017 via FalconPro3

RT @Mobile_Sec: TrustZone, TEE and mobile security https://t.co/KMl5qEQ2wf by @petergullberg @owasp

6:44am January 9th 2017 via FalconPro3

RT @Mobile_Sec: Where is the best place to store a password in your Android app? https://t.co/ETwGm9DOXA

8:01pm January 8th 2017 via FalconPro3

RT @m0thran: Anyone who was at my @HushCon talk might remember my bulk Apk analysis tool. Well I finally released it here: https://t.co/v4o8ygMPdh

3:52pm January 8th 2017 via FalconPro3

RT @waxzce: shellcheck, a static analysis tool for shell scripts https://t.co/BYqgfZAAYt // \o/ https://t.co/6PSgbyScN8

9:15am January 8th 2017 via FalconPro3

RT @laginimaineb: Derestricted a fun vuln yesterday; bypassing the TrustZone-enforced kernel module verification. https://t.co/6wzCrGajH4

1:22pm January 6th 2017 via FalconPro3

RT @roeehay: CVE-2016-8467: Attacking Nexus 6 & 6P Custom Bootmodes @MichaelGoberman @IBMSecurity #netsec https://t.co/JlabuxdcOz

9:21pm January 5th 2017 via FalconPro3

RT @CopperheadOS: @jcase @ebeip90 It currently makes sense to do encryption via the KeyStore to keep data encrypted while screen is locked but it's tricky.

9:51am January 5th 2017 via FalconPro3

RT @jcase: POC Source code (quick poc, not good code) for data exfiltration Google Pixel vuln (CVE-2016-8462) https://t.co/dOBWAIgJpc @firewaterdevs

9:21am January 5th 2017 via FalconPro3

RT @Mobile_Sec: Android January 2017 Security Bulletin: https://t.co/rBTs7Gma9G

7:15pm January 4th 2017 via FalconPro3

RT @ebeip90: Official, stable URLs for latest ADB & Fastboot, compiled by Google. No more XDAForums. You're welcome. /cc @jduck https://t.co/0tsaK4wt5D

7:09pm January 4th 2017 via FalconPro3

RT @jedisct1: Google Grumpy is a Python to Go source code transcompiler and runtime https://t.co/nBDNovCWzS

7:08pm January 4th 2017 via FalconPro3

RT @bcrypt: huge congrats to @trevp__ and @moxie for winning the 2017 Levchin Prize at #realworldcrypto for their work on Signa… https://t.co/cAPmTt4bvg

5:38pm January 4th 2017 via FalconPro3

RT @rotlogix: [BLOG] Solving a Random Mobile CrackMe Challenge with Lobotomy - Part 0x1 https://t.co/s3wXfhyzVY #android #mobile #security

10:23pm January 3rd 2017 via FalconPro3

@MrWiz Super Street Fighter II Turbo

9:24am January 3rd 2017 via FalconPro3 in reply to MrWiz