Hassan (@_cyclon3) 's Twitter Profile
Hassan

@_cyclon3

Security Engineer | CTF Player
Having fun with #MobileSecurity, #ReverseEngineering, & #RASP

ID: 1255132719878508544

linkhttps://www.cyclon3.com/ calendar_today28-04-2020 13:52:24

42 Tweet

95 TakipΓ§i

117 Takip Edilen

Martin Kleppe (@aemkei) 's Twitter Profile Photo

// #HIEROGLYPHS.js // Valid JavaScript from the year 2020 BC: π“…‚='',π“‚€=!π“…‚+π“…‚,𓁄=!π“‚€+π“…‚,π“ŠŽ=π“…‚+{},𓆣=π“‚€ [π“…‚++],π“Š=π“‚€[π“‡Ž=π“…‚],𓏒=++π“‡Ž+π“…‚,𓆗=π“ŠŽ[π“‡Ž+𓏒 ],π“‚€[𓆗+=π“ŠŽ[π“…‚]+(π“‚€.𓁄+π“ŠŽ)[π“…‚]+𓁄[𓏒]+𓆣+ π“Š+π“‚€[π“‡Ž]+𓆗+𓆣+π“ŠŽ[π“…‚]+π“Š][𓆗](𓁄[π“…‚]+𓁄[ π“‡Ž]+π“‚€[𓏒]+π“Š+𓆣+'`π“…‚ 𓏒 π“‚€ 𓁄 𓆣 π“Š π“‡Ž`')``

// #HIEROGLYPHS.js 
// Valid JavaScript from the year 2020 BC:

π“…‚='',π“‚€=!π“…‚+π“…‚,𓁄=!π“‚€+π“…‚,π“ŠŽ=π“…‚+{},𓆣=π“‚€
[π“…‚++],π“Š=π“‚€[π“‡Ž=π“…‚],𓏒=++π“‡Ž+π“…‚,𓆗=π“ŠŽ[π“‡Ž+𓏒
],π“‚€[𓆗+=π“ŠŽ[π“…‚]+(π“‚€.𓁄+π“ŠŽ)[π“…‚]+𓁄[𓏒]+𓆣+
π“Š+π“‚€[π“‡Ž]+𓆗+𓆣+π“ŠŽ[π“…‚]+π“Š][𓆗](𓁄[π“…‚]+𓁄[
π“‡Ž]+π“‚€[𓏒]+π“Š+𓆣+'`π“…‚ 𓏒 π“‚€ 𓁄 𓆣 π“Š π“‡Ž`')``
@Pwn20wnd (@pwn20wnd) 's Twitter Profile Photo

#unc0ver v5.0.0 will be the first 0day jailbreak released since iOS 8! Every other jailbreak released since iOS 9 used 1day exploits that were either patched in the next beta version or the hardware. This will be a big milestone for jailbreaking.

ZecOps - A Jamf Company (@zecops) 's Twitter Profile Photo

Apple just released the list of CVEs that were patched on iOS 13.5, including an official confirmation that the #MailDemon vulnerabilities were patched. The full list of security issues addressed on iOS 13.5 is available at: support.apple.com/de-de/HT211168

Apple just released the list of CVEs that were patched on iOS 13.5, including an official confirmation that the #MailDemon vulnerabilities were patched. The full list of security issues addressed on iOS 13.5 is available at: support.apple.com/de-de/HT211168
Synacktiv (@synacktiv) 's Twitter Profile Photo

Return of the iOS sandbox escape: lightspeed's back in the race!! The XNU bug johncool described last year was reintroduced and is still exploitable in the last version of iOS, as shown by unc0ver Team: synacktiv.com/posts/exploit/…

Return of the iOS sandbox escape: lightspeed's back in the race!! The XNU bug <a href="/JohnCool__/">johncool</a>  described last year was reintroduced and is still exploitable in the last version of iOS, as shown by <a href="/unc0verTeam/">unc0ver Team</a>: synacktiv.com/posts/exploit/…
Ben Hawkes (@benhawkes) 's Twitter Profile Photo

Apple have fixed three issues reported by Project Zero that were being actively exploited in the wild. CVE-2020-27930 (RCE), CVE-2020-27950 (memory leak), and CVE-2020-27932 (kernel privilege escalation). The security bulletin is available here: support.apple.com/en-us/HT211929

Romain THOMAS (@rh0main) 's Twitter Profile Photo

Here is the blog post about the anti-jailbreak, anti-Frida, anti-debug used in PokemonGO (featuring Frida and lief-project). romainthomas.fr/post/21-07-pok…

Here is the blog post about the anti-jailbreak, anti-Frida, anti-debug used in
PokemonGO (featuring <a href="/fridadotre/">Frida</a> and <a href="/LIEF_project/">lief-project</a>).

romainthomas.fr/post/21-07-pok…
OWASP Mobile App Security (@owasp_mas) 's Twitter Profile Photo

We released version 1.2 of the OWASP MSTG! As this is the first release after a while, there are quite a few changes. More details in our release notes: github.com/OWASP/owasp-ms… βœ… Download it βœ… Use it βœ… Give feedback via Github Issues Thank you to all of our supporters!

Hassan (@_cyclon3) 's Twitter Profile Photo

I've created an awesome list of iOS application security and penetration testing. I hope this helps people to learn more about #iOSsecurity. Your contributions are always welcome! github.com/Cy-clon3/aweso… #MobileSecurity #Cybersecurity #InfoSec #Bugbountytips #Bugbountytip

Objective-See Foundation (@objective_see) 's Twitter Profile Photo

It's not everyday new iOS malware is uncovered πŸ‘ΎπŸ“²πŸŽ In our latest (guest) blog post, Taha Karim (ulΧ–raβ€Ž), details how attackers are targeting iOS web3 users via malicious profiles & trojanized iOS apps: objective-see.org/blog/blog_0x6F… 😱

✞ inversecos (@inversecos) 's Twitter Profile Photo

How to reverse and exploit iOS binaries, part 2 😈 Read my step-by-step TUTORIAL on exploiting arm64 via: > buffer overflow attack > rop chain I also built another cute binary for u to hacky hack πŸ’• inversecos.com/2022/06/guide-…

How to reverse and exploit iOS binaries, part 2 😈

Read my step-by-step TUTORIAL on exploiting arm64 via:
&gt; buffer overflow attack
&gt; rop chain 

I also built another cute binary for u to hacky hack πŸ’•

inversecos.com/2022/06/guide-…
Ian Beer (@i41nbeer) 's Twitter Profile Photo

Excited to publish my writeup of a novel iOS in-the-wild exploit: The curious case of the fake Carrier .app: googleprojectzero.blogspot.com/2022/06/curiou…

Romain THOMAS (@rh0main) 's Twitter Profile Photo

Here is the first blog post about RASP analysis on iOS and some design weaknesses: romainthomas.fr/post/22-08-sin… Note: This is an **ephemeral** blog post, so feel free to grab a copy here: dl.romainthomas.fr Enjoy!

Here is the first blog post about RASP analysis on iOS and some design weaknesses:

romainthomas.fr/post/22-08-sin…

Note: This is an **ephemeral** blog post, so feel free to grab a copy here: dl.romainthomas.fr

Enjoy!
Romain THOMAS (@rh0main) 's Twitter Profile Photo

I'm happy to publish the second part of the series about iOS (de)Obfuscation and RASP protections. romainthomas.fr/post/22-09-ios… In particular, it introduces a new technique to "hook" syscalls on AArch64 based on 'gum_memory_patch_code' from Frida

I'm happy to publish the second part of the series about iOS (de)Obfuscation and RASP protections.

romainthomas.fr/post/22-09-ios…

In particular, it introduces a new technique to "hook" syscalls on AArch64 based on
'gum_memory_patch_code' from <a href="/fridadotre/">Frida</a>
Alex Plaskett (@alexjplaskett) 's Twitter Profile Photo

Here are some of the presentations I found the most interesting within the macOS/iOS Kernel Security research space in 2022! 🧡 alexplaskett.github.io/macos-ios-secu…

Here are some of the presentations I found the most interesting within the macOS/iOS Kernel Security research space in 2022! 🧡

alexplaskett.github.io/macos-ios-secu…
The Citizen Lab (@citizenlab) 's Twitter Profile Photo

🚨NEW REPORT: NSO Group’s #Pegasus #Spyware returns in 2022 with a trio of iOS 15 and iOS 16 zero-click exploit chains. The report finds NSO group clients deployed exploits against civil society members including two human right defenders in #Mexico citizenlab.ca/2023/04/nso-gr…

Prateekg147 (@prateekg147) 's Twitter Profile Photo

A 5-part complete series of on ARM64 exploitation and reversing by 8kSec Part1: 8ksec.io/arm64-reversin… Part2: 8ksec.io/arm64-reversin… Part3: 8ksec.io/arm64-reversin… Part4: 8ksec.io/arm64-reversin… Part5: 8ksec.io/arm64-reversin… Mobile Security

open-obfuscator (@open_obfuscator) 's Twitter Profile Photo

The challenge is now over! Congratulation to Robert Xiao for winning the write-up quality price and congratulation to korami as well for his solution. You can check them out here: - obfuscator.re/challenges/202… - obfuscator.re/challenges/202… (1/2)

The challenge is now over!

Congratulation to <a href="/nneonneo/">Robert Xiao</a>  for winning the write-up quality price and 
congratulation to korami as well for his solution.

You can check them out here:

- obfuscator.re/challenges/202…
- obfuscator.re/challenges/202…

(1/2)