Difference between revisions of "T8012 checkm8"

From The iPhone Wiki
Jump to: navigation, search
m
 
(6 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
{{DISPLAYTITLE:t8012 checkm8}}
 
{{DISPLAYTITLE:t8012 checkm8}}
  +
The least imaginative team name...
'''t8012 checkm8''' is a team of who have applied the [[checkm8]] vulnerability to the [[t8012]] or "T2" security processor on modern Mac computers.
 
  +
  +
'''t8012 checkm8''' is a team that have applied the [[checkm8]] vulnerability to the [[t8012]] or "T2" security processor on modern Mac computers.
   
 
==Work==
 
==Work==
* Checkm8 port to the T2 processor [https://github.com/h0m3us3r/ipwndfu]
+
* PlugNPwn auto DFU for the T2 [https://blog.t8012.dev/plug-n-pwn/]
* T2 restore using '''libimobiledevice''' [https://gist.github.com/rickmark/9245ed3ef7f36d5a0421557f68c4681b]
+
* [[Checkm8]] port to the T2 processor [https://github.com/h0m3us3r/ipwndfu]
  +
* [[T2]] restore using '''libimobiledevice''' [https://gist.github.com/rickmark/9245ed3ef7f36d5a0421557f68c4681b]
 
* [[USB Target Disk Mode]]
 
* [[USB Target Disk Mode]]
* Apple SMC Firmware Reverse Engineering
+
* Apple [[SMC]] Firmware Reverse Engineering
* Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware
+
* Analysis of [[FDR]] data in the SysCfg region of Flash, and it's potential for Malware
   
 
== Official Members ==
 
== Official Members ==
*[[User:h0m3us3r|h0m3us3r]
+
*[[User:h0m3us3r|h0m3us3r]]
*[[User:aunali1aunali1]]
+
*[[User:aunali1|aunali1]]
 
*[[User:mrarm|mrarm]]
 
*[[User:mrarm|mrarm]]
 
*[[User:rickmark|rickmark]]
 
*[[User:rickmark|rickmark]]
   
  +
== Links ==
  +
* Website - https://t8012.dev
  +
* Blog - https://blog.t8012.dev
  +
* Twitter - https://twitter.com/t8012dev
  +
* GitHub - https://github.com/t8012
   
 
[[Category:Hackers]]
 
[[Category:Hackers]]

Latest revision as of 12:07, 19 April 2021

The least imaginative team name...

t8012 checkm8 is a team that have applied the checkm8 vulnerability to the t8012 or "T2" security processor on modern Mac computers.

Work

  • PlugNPwn auto DFU for the T2 [1]
  • Checkm8 port to the T2 processor [2]
  • T2 restore using libimobiledevice [3]
  • USB Target Disk Mode
  • Apple SMC Firmware Reverse Engineering
  • Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware

Official Members

Links