About:

The author of the website focuses on wireless and firmware hacking, PhD life, and technology.

Website:

Specializations:

Incoming Links:

Subscribe to RSS:
iOS 18 introduced a new inactivity reboot security feature that locks keys secured by the Secure Enclave Processor (SEP) until the passcode is entered. This feature is designed to prevent unauthorized access to decrypted data on t...
The text discusses the challenges of learning reverse engineering on iOS and how to make it more accessible. It focuses on using Frida, a tool for dynamic reverse engineering of applications during runtime, and explores two option...

0macOS Frida Setup

2022-11-20

The text provides a guide on setting up Frida on an M1 Mac, including the necessary steps to attach to system processes and the additional steps required for macOS 14.4 and higher. It also includes troubleshooting tips for errors ...
The text provides a guide for setting up an iPhone for reversing and debugging, including increasing log levels, logging Bluetooth packets, enhancing debugserver privileges, connecting to debugserver with lldb, integrating debugse...
The text discusses the new feature in iOS 15.0 that allows an iPhone to be located with Find My even while the iPhone is turned off. It explains how this feature works, the role of the Always-on Processor (AOP), and the implementa...
The text discusses the BrakTooth Bluetooth vulnerability collection, its impact on devices, and the efforts to reproduce the bugs. It delves into the Link Management Protocol (LMP) in Bluetooth Classic, vulnerabilities affecting t...
The text explains how to use WLAN RAM Sharing to get controlled code execution on Wi-Fi via Bluetooth. It discusses the coexistence features of Broadcom and Cypress BT/Wi-Fi, the differences between Nexmon and InternalBlue, and Wi...
The text provides an overview of BlueZ, the Linux Bluetooth stack, from a programming and hacking perspective. It discusses the differences between Linux Bluetooth stack and mobile stacks, BlueZ layers and interfaces, Broadcom dia...
The text provides an overview of the InternalBlue Bluetooth research tool, its compatibility with different devices, and the advantages and shortcomings of using it. It also discusses the approach of InternalBlue and NexMon in mod...
The text discusses the Bluetooth Random Number Generator (RNG) and its importance in Bluetooth security. It covers the flaws in the current Bluetooth security, the vulnerabilities in the Bluetooth specification, and the issues wit...
Broadcom has found vulnerabilities in their Bluetooth chips, and they have implemented a method to apply patches to their chips. They store their firmware in a ROM, and use a Patchram to apply patches. However, they are running ou...
The text provides details about a low-cost OBS setup for recording videos on a laptop. It includes information about using a laptop, smartphone camera, light sources, sound, and running OBS twice.
The text discusses the issues with offensive critical infrastructure research, focusing on the German electronic health card terminals. The author outlines the problems with the system, the potential attack, and the response from ...
The text discusses the experience of supervising B.Sc./M.Sc. theses, offering advice on how to be a good mentor, setting goals, selecting topics, and providing career support. It also emphasizes the importance of being there for s...