Min(Spark) Zheng

277 posts

Min(Spark) Zheng banner
Min(Spark) Zheng

Min(Spark) Zheng

@SparkZheng

Android/iOS Senior Security Engineer @ Alibaba, CUHK PhD, a member of Blue-lotus and Insight-labs, worked in FireEye , Baidu and Tencent.

Katılım Aralık 2013
84 Takip Edilen23.4K Takipçiler
Min(Spark) Zheng retweetledi
checkra1n
checkra1n@checkra1n·
We planned to open source checkra1n in 2020, but unfortunately we're not quite ready for a full release yet. HOWEVER: We just open sourced the entirety of PongoOS, including our kernel patchfinder and SEP exploit! All available at: github.com/checkra1n/pong…
English
282
332
1.8K
0
Min(Spark) Zheng retweetledi
codecolorist@infosec.exchange
[email protected]@CodeColorist·
See No Eval: Runtime Dynamic Code Execution in Objective-C blog.chichou.me/2021/01/16/see… It reveals more detail that I didn't have time to cover in my previous talk slides
English
0
45
135
0
Min(Spark) Zheng retweetledi
Corellium
Corellium@CorelliumHQ·
It's been a long time coming: we’re very excited to announce that virtual iOS-based devices are now available for individual accounts on our groundbreaking security research platform. corellium.com/blog/ios-for-i…
English
20
214
869
0
Min(Spark) Zheng
Min(Spark) Zheng@SparkZheng·
You can use frida or lldb to hook or debug iOS apps on MacBook with M1 chip. hits: disable SIP and resign apps.
Min(Spark) Zheng tweet mediaMin(Spark) Zheng tweet media
English
6
73
332
0
Min(Spark) Zheng retweetledi
simo
simo@_simo36·
Here is a PoC kernel exploit, it demonstrates how to get kernel task port on iOS 13.7. I will update the PoC with a writeup later. github.com/0x36/oob_events
English
27
115
459
0
Min(Spark) Zheng retweetledi
Tielei
Tielei@WangTielei·
Cann’t believe that I also missed the bug. Motived by this blog, I also prepared a blog, sharing another bug in the same extension. blog.pangu.io/?p=221
Ben Hawkes@benhawkes

Our good friend @_bazad has a few things left over in the Project Zero publishing pipeline -- "it's really easy to miss bugs, even ones that you feel should have been obvious".

English
3
29
142
0
Min(Spark) Zheng retweetledi
Objective-See Foundation
Objective-See Foundation@objective_see·
📝 new (guest) blog post: "CVE-2020–9934: Bypassing TCC ...for unauthorized access to sensitive user data" 🔗 objective-see.com/blog/blog_0x4C… ✍️ by: Matt Shockley (@mattshockl) "...and then directly modify the TCC database to give myself every TCC entitlement" ...no code required 🤩
English
2
27
99
0
Min(Spark) Zheng retweetledi
Brandon Azad
Brandon Azad@_bazad·
One Byte to Rule Them All: An iOS 13 exploit technique that turns a one-byte kernel heap overflow into an arbitrary physical address mapping primitive, all while avoiding the kernel task port and sidestepping mitigations like PAC, KASLR, and zone_require. googleprojectzero.blogspot.com/2020/07/one-by…
English
12
252
712
0
Min(Spark) Zheng
Min(Spark) Zheng@SparkZheng·
Mosec 2020, iOS 14 JailBreak DEMO by Pangu
Min(Spark) Zheng tweet media
Indonesia
49
316
1.5K
0
Min(Spark) Zheng retweetledi
Brandon Azad
Brandon Azad@_bazad·
KTRW now has proper support for kernel debugging iOS 13. It uses checkra1n to insert an XNU kernel extension into the kernelcache before boot.
Brandon Azad tweet media
English
11
97
400
0
Min(Spark) Zheng
Min(Spark) Zheng@SparkZheng·
Cool and good job! I am more interested in what 0day vulnerabilities are used, but the entire payload has been obfuscated and it will take some time to analyze. 😅
@Pwn20wnd@Pwn20wnd

#unc0ver v5.0.1 is now out - unc0ver.dev.

English
2
10
75
0
Min(Spark) Zheng retweetledi
unc0ver Team
unc0ver Team@unc0verTeam·
We are going to release #unc0ver 5.0.0 with support for every signed iOS version on every device using a 0day kernel vulnerability from @Pwn20wnd in sponsorship with phonerebel.com very soon. Update your devices to 13.5 and follow our progress on unc0ver.dev.
English
1.1K
2K
7.2K
0