Xappy
@theXappy
Followers
150
Following
3K
Media
104
Statuses
581
Security Researcher 🩺 Into Windows(.NET)/iOS/protocols reversing and forensics.
Joined October 2019
I figured out a generic way to generate those polyglots! Introducing: bppb! https://t.co/OiuVkMhSMK This PoC takes 2 files, a bplist and a protobuf, and merges them into one unholy abomination. #bplist #protobuf #polyglot #dfir #digitalforensics
Annoyingly, I created a bplist-protobuf polyglot. This one is a valid protobuf containing 2 LengthValues in an array. As a bplist, it's a dictionary with 2 Key-Value-Pairs. Hex here: https://t.co/dQsTi7esTF
#DFIR #MobileForensics #DigitalForensics
0
2
14
💡Understand how ROP can be used to bypass security defenses and execute code on ARM64 devices in Part 3 of our ARM64 Reversing and Exploitation Series: https://t.co/dNF87FPDhk 📥Want to strengthen your ARM64 exploitation skills? Check out our free ARM64 challenges:
0
42
199
I wanted to understand what information is available in .pdb files, so I made a tool for it 🔎🪲 Welcome DiaSymbolView - a debug symbol hierarchy and properties viewer based on MSDIA: https://t.co/mSWAolfrFt
3
56
174
I've been hacking on a new Windows Named Pipe tool called PipeTap which helps analyse named pipe communications. Born out of necessity while doing some vulnerability research on a target, its been super useful in reversing it's fairly complex protocol. :)
17
143
1K
* Samsung Flow is not pre-installed on Samsung devices, so the userbase was relatively small. (definitely NOT 'everyone with a Samsung device') ** Obviously, already patched by Samsung.
1
0
1
The bug was misusage of AES in CTR mode, allowing an attacker with only MotS access to partially decrypt the app's traffic. Developing the whole exploit (discovering enough data from the 'key stream' to fetch the SMS's content) was challenging but super fun.
1
0
1
PoC video I submitted to Samsung like 2 years ago for CVE-2023-21444 Targeting the Samsung Flow app. Assumed victim and I share a WiFi network, I could steal the 2FA password reset link for Instagram (or any other SMS) sent to their mobile.
1
1
4
Ever wondered what your modem really says to your SIM card? I sniffed raw APDU traffic off the SIM pins, decoded the UART based on the ATR, and piped it into Wireshark. Full guide: how to wire it, decode it, and see the bytes for yourself. 🔎💥📶 https://t.co/aBjdRVKF6x
0
0
2
Centralized resource for listing and organizing known injection techniques and POCs #malware #dfir
https://t.co/Z0qu8Ne3Pl
github.com
Centralized resource for listing and organizing known injection techniques and POCs - itaymigdal/awesome-injection
0
37
121
After #flareon11 challenge 7, I got inspired to build tooling for #dotnet Native AOT reverse engineering. As such, I built a #Ghidra Analyzer that can automatically recover most .NET types, methods and frozen objects (e.g., strings). Blog:👉 https://t.co/qmGBlgCUir
3
109
331
re-using the malware's baked-in cleanup routine will always be funny to me.
0
6
29