Min(Spark) Zheng (@sparkzheng) 's Twitter Profile
Min(Spark) Zheng

@sparkzheng

Android/iOS Senior Security Engineer @ Alibaba, CUHK PhD, a member of Blue-lotus and Insight-labs, worked in FireEye , Baidu and Tencent.

ID: 2265701526

calendar_today28-12-2013 10:17:47

277 Tweet

24,24K Followers

84 Following

unc0ver Team (@unc0verteam) 's Twitter Profile Photo

We are going to release #unc0ver 5.0.0 with support for every signed iOS version on every device using a 0day kernel vulnerability from @Pwn20wnd in sponsorship with phonerebel.com very soon. Update your devices to 13.5 and follow our progress on unc0ver.dev.

Min(Spark) Zheng (@sparkzheng) 's Twitter Profile Photo

Cool and good job! I am more interested in what 0day vulnerabilities are used, but the entire payload has been obfuscated and it will take some time to analyze. 😅

Brandon Azad (@_bazad) 's Twitter Profile Photo

KTRW now has proper support for kernel debugging iOS 13. It uses checkra1n to insert an XNU kernel extension into the kernelcache before boot.

KTRW now has proper support for kernel debugging iOS 13. It uses checkra1n to insert an XNU kernel extension into the kernelcache before boot.
Objective-See Foundation (@objective_see) 's Twitter Profile Photo

📝 new (guest) blog post: "CVE-2020–9934: Bypassing TCC ...for unauthorized access to sensitive user data" 🔗 objective-see.com/blog/blog_0x4C… ✍️ by: Matt Shockley (Matt Shockley) "...and then directly modify the TCC database to give myself every TCC entitlement" ...no code required 🤩

Brandon Azad (@_bazad) 's Twitter Profile Photo

One Byte to Rule Them All: An iOS 13 exploit technique that turns a one-byte kernel heap overflow into an arbitrary physical address mapping primitive, all while avoiding the kernel task port and sidestepping mitigations like PAC, KASLR, and zone_require. googleprojectzero.blogspot.com/2020/07/one-by…

Min(Spark) Zheng (@sparkzheng) 's Twitter Profile Photo

zone_require() mitigation (address verification for Mach port objects) was changed on iOS 13.6, looking forward to seeing a new bypass~

simo (@_simo36) 's Twitter Profile Photo

Here is a PoC kernel exploit, it demonstrates how to get kernel task port on iOS 13.7. I will update the PoC with a writeup later. github.com/0x36/oob_events

Tielei (@wangtielei) 's Twitter Profile Photo

Cann’t believe that I also missed the bug. Motived by this blog, I also prepared a blog, sharing another bug in the same extension. blog.pangu.io/?p=221

checkra1n (@checkra1n) 's Twitter Profile Photo

We planned to open source checkra1n in 2020, but unfortunately we're not quite ready for a full release yet. HOWEVER: We just open sourced the entirety of PongoOS, including our kernel patchfinder and SEP exploit! All available at: github.com/checkra1n/pong…

codecolorist@infosec.exchange (@codecolorist) 's Twitter Profile Photo

See No Eval: Runtime Dynamic Code Execution in Objective-C blog.chichou.me/2021/01/16/see… It reveals more detail that I didn't have time to cover in my previous talk slides

Corellium (@corelliumhq) 's Twitter Profile Photo

It's been a long time coming: we’re very excited to announce that virtual iOS-based devices are now available for individual accounts on our groundbreaking security research platform. corellium.com/blog/ios-for-i…

Objective-See Foundation (@objective_see) 's Twitter Profile Photo

An Objective-See Foundation tool, flagged what may be the first instance of malicious code that natively targets Apple Silicon (M1)! 🍎🐛 Read: "Arm'd & Dangerous" objective-see.com/blog/blog_0x62…