Alex “neat” A. (@neatmonster_) 's Twitter Profile
Alex “neat” A.

@neatmonster_

well now I am not doing it · co-founder @the_impalabs

ID: 435965222

linkhttps://neat.sh calendar_today13-12-2011 16:51:08

202 Tweet

660 Followers

241 Following

Man Yue Mo (@mmolgtm) 's Twitter Profile Photo

This might be the best bug I found. Never thought I'd be writing a kernel exploit as reliable, clean and fast as a browser exploit. For a while I actually used this to root my research phone when can't be bothered to patch the rom: github.blog/2022-07-27-cor…

Hexacon (@hexacon_fr) 's Twitter Profile Photo

Lunch is over and now it’s time for Maxime Peterlin and Alexandre Adamski from Impalabs to talk about « Hara-Kirin: Dissecting the Privileged Components of Huawei Mobile Devices » #HEXACON2022

Lunch is over and now it’s time for Maxime Peterlin and Alexandre Adamski from <a href="/the_impalabs/">Impalabs</a> to talk about « Hara-Kirin: Dissecting the Privileged Components of Huawei Mobile Devices » 

#HEXACON2022
Impalabs (@the_impalabs) 's Twitter Profile Photo

Here are the slides of our Hexacon talk about breaking the privileged components of Huawei's mobile devices. Thanks to everyone who attended, we hoped you liked it, and stay tuned for the upcoming blog posts! github.com/Impalabs/confe…

Here are the slides of our <a href="/hexacon_fr/">Hexacon</a> talk about breaking the privileged components of Huawei's mobile devices.

Thanks to everyone who attended, we hoped you liked it, and stay tuned for the upcoming blog posts!

github.com/Impalabs/confe…
Impalabs (@the_impalabs) 's Twitter Profile Photo

If you've missed our talk at Hexacon, the recording of “Hara-Kirin: Dissecting Huawei Mobile Devices” is now available! Come with us for a guided tour of Huawei's Hypervisor and TrustZone, and learn about the cool bugs we discovered along the way. youtu.be/LxoHSrrGaNA

Impalabs (@the_impalabs) 's Twitter Profile Photo

Today we are releasing Hyperpom, a fuzzing framework for ARM64 binaries based on the Apple Silicon hypervisor. Check out our latest blogpost, as well as our GitHub repo, to learn more about the project and its internals. 📙 blog.impalabs.com/2211_hyperpom.… 🗃️ github.com/impalabs/hyper…

Today we are releasing Hyperpom, a fuzzing framework for ARM64 binaries based on the Apple Silicon hypervisor. Check out our latest blogpost, as well as our GitHub repo, to learn more about the project and its internals.

📙 blog.impalabs.com/2211_hyperpom.…
🗃️ github.com/impalabs/hyper…
Impalabs (@the_impalabs) 's Twitter Profile Photo

Who watches the watchmen? With our latest blogpost and advisory, dive deep into the security hypervisor that protects the Android kernel of Huawei devices, and learn about the vulnerability we exploited to compromise it. 📝 blog.impalabs.com/2212_huawei-se… ⚠️ blog.impalabs.com/2212_advisory_…

Who watches the watchmen? With our latest blogpost and advisory, dive deep into the security hypervisor that protects the Android kernel of Huawei devices, and learn about the vulnerability we exploited to compromise it.

📝 blog.impalabs.com/2212_huawei-se…
⚠️ blog.impalabs.com/2212_advisory_…
DAY[0] (@dayzerosec) 's Twitter Profile Photo

Going live for the binary episode of the podcast. Today we have a Huawei Hypervisor vuln, a FreeBSD stack overflow in ping, and some discussion on ChatGPT. twitch.tv/dayzerosec

Going live for the binary episode of the podcast. Today we have a Huawei Hypervisor vuln, a FreeBSD stack overflow in ping, and some discussion on ChatGPT.

twitch.tv/dayzerosec
Impalabs (@the_impalabs) 's Twitter Profile Photo

Our newest advisory is about the Secure Monitor, a component of Huawei's TrustZone. It details 3 vulnerabilities (CVE-2021-39994, CVE-2021-22437, CVE-2021-39993) that we exploited to execute code at EL3, the highest privilege level of Android devices. blog.impalabs.com/2212_advisory_…

DAY[0] (@dayzerosec) 's Twitter Profile Photo

Binary episode is live in about 10 minutes. Today we have a browser bug, a post by project zero on a linux kernel exploit, and some Huawei secure monitor bugs. twitch.tv/dayzerosec

Binary episode is live in about 10 minutes. Today we have a browser bug, a post by project zero on a linux kernel exploit, and some Huawei secure monitor bugs.

twitch.tv/dayzerosec
Man Yue Mo (@mmolgtm) 's Twitter Profile Photo

In this post I'll use CVE-2022-38181, a use-after-free I reported last year in the Arm Mali GPU driver to gain arbitrary kernel code execution and root from untrusted Android app. Not sure if the bug or the disclosure is more interesting: github.blog/2023-01-23-pwn…

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

FaultyUSB: exploiting a TOCTOU race condition bug in recovery to get root on Huawei devices by emulating a malicious USB flash drive labs.taszk.io/articles/post/…

Impalabs (@the_impalabs) 's Twitter Profile Photo

Our latest advisory is about a logic bug in Parallels Desktop that can be used to escape from VMs. It stems from a directory traversal and an incorrect use of Qt's strings resulting in unexpected behavior. 📝 blog.impalabs.com/2303_advisory_… 🗃️ github.com/Impalabs/CVE-2…

DAY[0] (@dayzerosec) 's Twitter Profile Photo

Live with this week's bounty episode in about 10 minutes. Today we have a Parallels Desktop toolgate bug, bypassing CloudTrail, and some GPT discussion. twitch.tv/dayzerosec

Man Yue Mo (@mmolgtm) 's Twitter Profile Photo

In this post I'll look at a patching issue that leaves Pixel 6 vulnerable to an already fixed bug for more than 5 months. This allows arbitrary kernel code execution and root from an untrusted app and shows some potential problems with backporting: github.blog/2023-04-06-pwn…

Guanxing (@hhj4ck) 's Twitter Profile Photo

Slides and demos of core escalation: github.com/hhj4ck/CoreEsc… Welcome to join me during the meet + greet this afternoon (Booth 3241 - Meetup Lounge, Business Hall)

Impalabs (@the_impalabs) 's Twitter Profile Photo

After a bit of delay, we're finally releasing advisories for 139 vulnerabilities we found in 23 trustlets used on Huawei mobile devices. Some of them can be exploited to access the Secure World and retrieve sensitive data. 🧵 A thread of our most interesting findings

After a bit of delay, we're finally releasing advisories for 139 vulnerabilities we found in 23 trustlets used on Huawei mobile devices. Some of them can be exploited to access the Secure World and retrieve sensitive data.

🧵 A thread of our most interesting findings
Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Unburdened By What Has Been: Exploiting New Attack Surfaces in Radio Layer 2 for Baseband RCE on Samsung Exynos labs.taszk.io/articles/post/…