Alaid TechThread
676 subscribers
6 photos
1 video
82 files
1.31K links
Vulnerability discovery, threat intelligence, reverse engineering, AppSec
Download Telegram
https://www.weibo.com/ttarticle/p/show?id=2309404245794218721506 iOS jailbreak internals (1): Remount rootfs after iOS 11.3
Forwarded from r0 Crew (Channel) (Bear0)
VUzzer: application-aware evolutionary fuzzing strategy that does not require any prior knowledge of the application or input format.

https://sharcs-project.eu/m/filer_public/48/8c/488c5fb7-9aad-4c87-ab9c-5ff251ebc73d/vuzzer_ndss17.pdf

https://github.com/vusec/vuzzer #fuzzing #MorteNoir
Forwarded from r0 Crew (Channel) (Bear0)
CVE-2018-5002 - Adobe Flash Zero-Day Leveraged for Targeted Attack in Middle East
https://www.icebrg.io/blog/adobe-flash-zero-day-targeted-attack

CVE-2018-5002 – Analysis of the Second Wave of Flash Zero-day Exploit in 2018
https://blogs.360.cn/blog/cve-2018-5002-en/

Sample for Flash 0 Day - CVE-2018-5002

1. XLSX file with ActiveX Control to download 1st stage SWF
2. 1st stage SWF downloads 2nd stage AES encrypted SWF
3. 1st stage SWF decrypts and loads the 2nd stage SWF (0 day)

https://www.virustotal.com/#/file/0b4f0d8d57fd1cb9b4408013aa7fe5986339ce66ad09c941e76626b5d872e0b5/details

Decrypted SWF for CVE-2018-5002, the full hash is:
f63a51e78116bebfa1780736d343c9eb

#expdev #flash #darw1n
Forwarded from r0 Crew (Channel) (Bear0)