上一页 1 2 3 4 5 6 7 8 9 ··· 21 下一页
摘要: org link:http://dtrace.org/blogs/brendan/2011/10/10/top-10-dtrace-scripts-for-mac-os-x/Top 10 DTrace scripts for Mac OS XSince version 10.5 “Leopard”,... 阅读全文
posted @ 2014-05-14 11:11 Proteas 阅读(881) 评论(0) 推荐(0) 编辑
摘要: Mac's are excellent tools for accessing serial device TTY ports (to console into PBX's, switches, and routers). You just need a serial to USB adapter, the right driver, and some Terminalsoftware.You... 阅读全文
posted @ 2014-05-09 13:51 Proteas 阅读(1224) 评论(0) 推荐(0) 编辑
摘要: PinSignalDescriptionApple pin numbering*1GNDGround (-), internally connected with Pin 2 on iPod motherboard302GNDAudio & Video ground (-), internally connected with Pin 1 on iPod motherboard293RightLi... 阅读全文
posted @ 2014-05-09 10:40 Proteas 阅读(414) 评论(0) 推荐(0) 编辑
摘要: link:http://www.tutorialspoint.com/unix_system_calls/execve.htmNAMEexecve - execute programSYNOPSIS#include int execve(const char *filename, char *const argv[], char *const envp[]); DESCRI... 阅读全文
posted @ 2014-05-06 13:48 Proteas 阅读(380) 评论(0) 推荐(0) 编辑
摘要: src:http://stackoverflow.com/questions/8793099/unload-dynamic-library-needs-two-dlclose-callsQuestion:I have a dynamic library which I load usingdlope... 阅读全文
posted @ 2014-04-22 11:17 Proteas 阅读(490) 评论(0) 推荐(0) 编辑
摘要: =========================================================================a.c----------------------------------void main (int argc, char **argv) { p... 阅读全文
posted @ 2014-04-21 17:37 Proteas 阅读(436) 评论(0) 推荐(0) 编辑
摘要: src:http://blog.thireus.com/tag/kernelcache Before going further it is important to enumerate some of the main security features available on iOS. The... 阅读全文
posted @ 2014-04-17 11:43 Proteas 阅读(543) 评论(0) 推荐(0) 编辑
摘要: If want to do iOS kernel debugging on A4 device, first you should installVirtual COM port (VCP) drivers. After has installed the driver on OS X Maveri... 阅读全文
posted @ 2014-04-14 11:13 Proteas 阅读(397) 评论(0) 推荐(0) 编辑
摘要: export DEVELOPER_DIR := $(shell xcode-select --print-path)PLATFORM="$(DEVELOPER_DIR)/Platforms/iPhoneOS.platform"SDK_DEVICE="$(DEVELOPER_DIR)/Platfo... 阅读全文
posted @ 2014-04-09 11:14 Proteas 阅读(503) 评论(0) 推荐(0) 编辑
摘要: just my thinking, 3 ways to escape from sandbox on jailbreak device, to do file copying or execute super commands.Way-1, Use MobileSubstrate to inject to root process, for example: locationd.Way-2, signed your app with debug permission. and dynamicly inject code to other process.Way-3, signed your a 阅读全文
posted @ 2014-04-04 13:57 Proteas 阅读(252) 评论(0) 推荐(0) 编辑
上一页 1 2 3 4 5 6 7 8 9 ··· 21 下一页