gsch (@__gsch) 's Twitter Profile
gsch

@__gsch

ID: 1017528256411652103

calendar_today12-07-2018 21:56:55

16 Tweet

228 Followers

313 Following

gsch (@__gsch) 's Twitter Profile Photo

Since Faisal Tameesh already shared his exploit for CVE-2017-12561 and I believe it’s useful to see different ways of exploiting the same vulnerability, here's my blog post about a 1922-Day for CVE-2017-12561. guas.ch/posts/1922-day…

john (@nyan_satan) 's Twitter Profile Photo

Here is my preliminary iPod nano 6 (S5L8723) port of the new bootrom exploit by gsch - S5Late As usual, be careful with this and etc. github.com/NyanSatan/S5La…

john (@nyan_satan) 's Twitter Profile Photo

iPod shuffle 4 (S5L8443) is now also O B L I T E R A T E D by virtue of gsch's S5Late bug (Yes, the ROM is so similar to S5L8723, that they didn't even bother changing serial number string)

iPod shuffle 4 (S5L8443) is now also O B L I T E R A T E D by virtue of <a href="/__gsch/">gsch</a>'s S5Late bug

(Yes, the ROM is so similar to S5L8723, that they didn't even bother changing serial number string)
gsch (@__gsch) 's Twitter Profile Photo

After working together with q3k, wInd3x now supports iPod Nano 7G by using S5Late. That makes decrypting and running custom binaries very straightforward. github.com/freemyipod/wIn…

gsch (@__gsch) 's Twitter Profile Photo

Turns out you could access DiagShell in iPod Nano7 without any exploit by just sending the diag image after WTF. And memrw works so you can read/write anywhere 🙃

Turns out you could access DiagShell in iPod Nano7 without any exploit by just sending the diag image after WTF. And memrw works so you can read/write anywhere 🙃
gsch (@__gsch) 's Twitter Profile Photo

Getting some earlyprintk going for the iPod Nano7 after I managed to get USB working on U-Boot. Also figured enough of the LCD controller to draw on the screen. This is all thanks to previous work by q3k :)

Getting some earlyprintk going for the iPod Nano7 after I managed to get USB working on U-Boot. Also figured enough of the LCD controller to draw on the screen.
This is all thanks to previous work by q3k :)
john (@nyan_satan) 's Twitter Profile Photo

Amazing as always! Thanks to the organizers and attendees! I had honor to present my & gsch’s & q3k’s talk titled “1,000 bugs in your pocket” We’ll likely publish the slides soon

john (@nyan_satan) 's Twitter Profile Photo

Here are the slides from my & gsch's & q3k's 0x41con 2025 talk - "1,000 bugs in your pocket" It's about non-iOS iPod hacking github.com/NyanSatan/Slid…

Hexacon (@hexacon_fr) 's Twitter Profile Photo

Another newcomer is sponsoring us this year: Paradigm Shift! Paradigm Shift is an independent European EU leader in cybersecurity research. With a team of world-class researchers, we uncover critical zero-days and deliver state-of-the-art research to keep our partners one step ahead.

Another newcomer is sponsoring us this year: <a href="/prdgmshift/">Paradigm Shift</a>! 

<a href="/prdgmshift/">Paradigm Shift</a> is an independent European EU leader in cybersecurity research. With a team of world-class researchers, we uncover critical zero-days and deliver state-of-the-art research to keep our partners one step ahead.
Paradigm Shift (@prdgmshift) 's Twitter Profile Photo

Oh, one more thing… our new website is live! 🌐 ps.tc Still lots in the works - from our research blog to other initiatives - but here’s a nice sneak peek for now 👀