qraux.bsky.social
@qraux.bsky.social
#dfir
 #security
Unmixing the mix: Patterns and challenges in Bitcoin mixer investigations (Tippe & Deckers, 2025) www.sciencedirect.com/science/arti...
September 15, 2025 at 7:13 AM
Live data forensic tool testbed: Proof of concept (Bergum et al., 2025) www.sciencedirect.com/science/arti... #dfir
August 27, 2025 at 9:24 AM
Argus: A new approach for forensic analysis of apps on mobile devices (Boztas et al. 2025): www.sciencedirect.com/science/arti... #dfir
May 30, 2025 at 11:11 AM
Reposted
Unrestrict the restricted mode for USB on iPhone. A first analysis @citizenlab.ca #CVE-2025-24200 👉 blog.quarkslab.com/first-analys...
February 14, 2025 at 11:07 AM
ACE up the sleeve:
Hacking into Apple's new USB-C Controller: media.ccc.de/v/38c3-ace-u...
January 14, 2025 at 10:42 AM
What's up next? Auto Lock Down Mode? 🙄
#DFIR 💭 of the day: Testing can take considerable time but is worth it!

Particularly if you are testing a 72 hour time out - each new go is 72 more hours! Thanks to Nick Dubois for his testing of the iOS inactivity feature that causes iOS devices to reboot.

www.hexordia.com/blog/ios18-r...
iOS Inactivity Reboot — Hexordia
Apple continues to bolster the security of its mobile lineup with the introduction of the “Inactivity Reboot.” This feature automatically reboots the device after 72 hours of inactivity, forcing the d...
www.hexordia.com
November 26, 2024 at 8:54 PM
Reposted
x.com/josephfcox/s...

We have a good idea of what's happening here based on the detailed info we obtained about MSAB's XRY exploit tool. We reported those exploits to Google in January 2024 with multiple proposals on how to stop it. April 2024 is when the first 2 shipped.
x.com
x.com
November 19, 2024 at 5:02 PM
Reposted
How does the new iOS inactivity reboot work? What does it protect from?

I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.

naehrdine.blogspot.com/2024/11/reve...
Reverse Engineering iOS 18 Inactivity Reboot
Wireless and firmware hacking, PhD life, Technology
naehrdine.blogspot.com
November 17, 2024 at 9:42 PM
Reposted
April release of the Pixel boot chain firmware includes fixes for 2 vulnerabilities reported by GrapheneOS which are being actively exploited in the wild by forensic companies:

source.android.com/docs/securit... source.android.com/docs/securit...

These are assigned CVE-2024-29745 / CVE-2024-29748.
April 3, 2024 at 12:30 AM