The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "T8012 checkm8"
Musicguy32 (talk | contribs) m |
|||
(5 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
{{DISPLAYTITLE:t8012 checkm8}} |
{{DISPLAYTITLE:t8012 checkm8}} |
||
+ | The least imaginative team name... |
||
− | '''t8012 checkm8''' is a team of who have applied the [[checkm8]] vulnerability to the [[t8012]] or "T2" security processor on modern Mac computers. |
||
+ | |||
+ | '''t8012 checkm8''' is a team that have applied the [[checkm8]] vulnerability to the [[t8012]] or "T2" security processor on modern Mac computers. |
||
==Work== |
==Work== |
||
− | * |
+ | * PlugNPwn auto DFU for the T2 [https://blog.t8012.dev/plug-n-pwn/] |
− | * |
+ | * [[Checkm8]] port to the T2 processor [https://github.com/h0m3us3r/ipwndfu] |
+ | * [[T2]] restore using '''libimobiledevice''' [https://gist.github.com/rickmark/9245ed3ef7f36d5a0421557f68c4681b] |
||
* [[USB Target Disk Mode]] |
* [[USB Target Disk Mode]] |
||
− | * Apple SMC Firmware Reverse Engineering |
+ | * Apple [[SMC]] Firmware Reverse Engineering |
− | * Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware |
+ | * Analysis of [[FDR]] data in the SysCfg region of Flash, and it's potential for Malware |
== Official Members == |
== Official Members == |
||
*[[User:h0m3us3r|h0m3us3r]] |
*[[User:h0m3us3r|h0m3us3r]] |
||
− | *[[User: |
+ | *[[User:aunali1|aunali1]] |
*[[User:mrarm|mrarm]] |
*[[User:mrarm|mrarm]] |
||
*[[User:rickmark|rickmark]] |
*[[User:rickmark|rickmark]] |
||
+ | == Links == |
||
+ | * Website - https://t8012.dev |
||
+ | * Blog - https://blog.t8012.dev |
||
+ | * Twitter - https://twitter.com/t8012dev |
||
+ | * GitHub - https://github.com/t8012 |
||
[[Category:Hackers]] |
[[Category:Hackers]] |
Latest revision as of 12:07, 19 April 2021
The least imaginative team name...
t8012 checkm8 is a team that have applied the checkm8 vulnerability to the t8012 or "T2" security processor on modern Mac computers.
Work
- PlugNPwn auto DFU for the T2 [1]
- Checkm8 port to the T2 processor [2]
- T2 restore using libimobiledevice [3]
- USB Target Disk Mode
- Apple SMC Firmware Reverse Engineering
- Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware
Official Members
Links
- Website - https://t8012.dev
- Blog - https://blog.t8012.dev
- Twitter - https://twitter.com/t8012dev
- GitHub - https://github.com/t8012