Luke M's Avatar

Luke M

@datalocaltmp

mobile reverse engineering, vulnerability research, using lldb https://s11research.com

17
Followers
10
Following
4
Posts
13.11.2024
Joined
Posts Following

Latest posts by Luke M @datalocaltmp

Messenger Group Call DoS for iOS Messenger is used by hundreds of millions of people globally, and as of December 2023, it has adopted end-to-end encryption (E2EE) by default for chats and calls. However, when a group chat is created...

Did you know an angry face emoji could crash Messenger for iOS ๐Ÿ˜ก In my latest write-up, I uncover a Messenger Group Call DoS vulnerability.

Read it through to see how I use the new Malimite tool to translate Ghidra decompiled output into Objective-C.

s11research.com/posts/Messen...

12.12.2024 13:13 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

These researchers always add themselves to my PoC videos ๐Ÿ˜ก๐Ÿ˜ก๐Ÿ˜ก

11.12.2024 15:38 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image

Stoked up to be doing some iOS reverse engineering - creating a write-up now using some AI-powered tools and impressed with the translation of Ghidra's decompiled output to Objective-C (proper write-up coming soon!)

10.12.2024 22:07 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Facebook Messenger Bug Hunting - A Bug's E2E Lifecycle -Samuel Cohen y Luke McLaren - Ekoparty 2024
Facebook Messenger Bug Hunting - A Bug's E2E Lifecycle -Samuel Cohen y Luke McLaren - Ekoparty 2024 YouTube video by Ekoparty Security Conference

Here's my talk at EkoParty with the team from Meta - shoot me a message if you have questions!

www.youtube.com/watch?v=M_QP...

10.12.2024 21:59 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0