|
You are here |
secret.club | ||
| | | | |
comsecuris.com
|
|
| | | | | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms. | |
| | | | |
decoded.avast.io
|
|
| | | | | Zero-Day Exploit Powers Advanced Rootkit | |
| | | | |
www.riscure.com
|
|
| | | | | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them. | |
| | | | |
readrust.net
|
|
| | | Read Rust collects and categorises interesting posts related to the Rust programming language. This page lists posts in the Performance category. | ||