The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "T8012 checkm8"
(→Work) |
(→Work) |
||
Line 7: | Line 7: | ||
* [[USB Target Disk Mode]] |
* [[USB Target Disk Mode]] |
||
* Apple SMC Firmware Reverse Engineering |
* Apple SMC Firmware Reverse Engineering |
||
+ | * Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware |
||
== Official Members == |
== Official Members == |
Revision as of 05:14, 14 May 2020
t8012 checkm8 is a team of who have applied the checkm8 vulnerability to the t8012 or "T2" security processor on modern Mac computers.
Work
- Checkm8 port to the T2 processor [1]
- T2 restore using libimobiledevice [2]
- USB Target Disk Mode
- Apple SMC Firmware Reverse Engineering
- Analysis of FDR data in the SysCfg region of Flash, and it's potential for Malware