Apple HomePod Mini Data Dump - Extended Logging #iphone #infosec #iOS #siri twitter.com/i/broadcasts/1…
Show all recent files that have changed in a specific directory.

find . -exec stat -f '%m%t%Sm %N' {} + | sort -n | cut -f2-

find . = search in the current directory that you are in.
change the . to any dir to see all changes in dir.
developer.apple.com/bug-reporting/…

You can get the latest mobileconfig files here
start an http localhost with python

python -m SimpleHTTPServer 8081

thanks @SMT_Solvers

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jonathan Scott

Jonathan Scott Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jonathandata1

7 Nov
Another issue I want to raise is the hate train...Let me get this clear, I have no issue with @thecybermentor Heath Adams, I'm a supporter of his content, but I don't support hate. Thankfully, the hate is directed towards me, but the "hate" stems from my human rights activism.
Along with being a phone hacker, I am a digital human rights defender. What Heath sees as me seeking attention is not the truth at all. I have supported even my biggest and hateful opposition in their time of need, I will always help anyone that is being wronged the best I can.
Read 8 tweets
17 Oct
Some of the most elite phone hackers in the world are in an industry many ppl have never heard called, reverse logistics. Similarly, top phone repair techs, can exploit hardware & software vuln., effortlessly. Recruited from around the world by Big Tech silenced by NDAs #infosec
Most phone exploits that float around #infosec and the media are 5-7 years behind what these hackers already have. They are holed up behind special access card rooms in Big Tech and Small Tech R&D facilities, separated from all other engineers.
Almost in all cases around the world I have seen and been, the hackers are on 24/7 video and audio recording surveillance. I was one of them.
Read 24 tweets
14 Oct
Jailbreaking should never be use to perform mobile forensic analysis if you plan on being an expert witness in a court case, the “artifacts,” or rather entirely new data sets comprise the integrity of the device. It is a #HumanRights violation to submit evidence in this manner
Tomorrow I will teach you how to extract data while leaving a minimal amount of artifacts that can all be traced and documented so you can stay ethical and present professional #mobileforensics analysis reports with supporting traces, without jailbreaking.
Here are some great white papers to read about ethically performing iOS forensic analysis as it pertains to court submitted evidence. researchgate.net/publication/33…
Read 5 tweets
13 Oct
The People Must Know....

I made my first million by abusing the trust of everyone in the world. I can never apologize enough for what I have done...I am sorry

In 2018, I was asked by Verizon Wireless employees working at XPO logistics to create an auto auth ADB solution....
Over a period of a few months, I flew to Dallas, Texas and met with high level Verizon Employees inside of XPO logistics...

I had many demo's of my Samsung Verizon ADB authorized solution that did not require any human interaction...no rooting...
I performed my exploit in-front of many Verizon employees, IT, security, directors, etc...They gave me a fresh Macbook pro, and phones they pulled themselves from XPO logistics production floor, they provided the cables as well. I wrote my exploit live in front of them...
Read 9 tweets
11 Oct
Ok let’s hold on Apple Live Tonight because idk WTF is going on with MacOS and iOS 15.0.2 right now but we will still be doing LG Live Zero-Day exploitation,all are welcome…raw code is out in my feed somewhere and I’m creating the Repo on GitHub now #CybersecurityAwarenessMonth
I will show you where the code elevates privileges and how
Anyone that has been watching my LG exploits, please help others if they have questions…let’s unite on this please…let’s not fight, I’ve worked on this for years and made many video demos…you finally get the full code…as promised …
Read 4 tweets
10 Oct
iOS 15.0.1 RCE PoC Version 1 of Many #infosec twitter.com/i/broadcasts/1…
I hope you all can see this is a real issue, thanks for all the support, and i will. be showing part 2 very soon!
I want to be clear on this first PoC, this is executed on a trusted host, this is why I had initially said and agreed that the barrier to entry is still a little high...so a threat actor needs to take the lockdown records of the trusted host or take over the trusted host step 1
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(