
alephsecurity.com/2017/03/08/nexus9-fiq-debugger
Preview meta tags from the alephsecurity.com website.
Linked Hostnames
11- 6 links toalephsecurity.com
- 3 links toandroid.googlesource.com
- 2 links toen.wikipedia.org
- 2 links totwitter.com
- 2 links towww.st.com
- 1 link tomedia.blackhat.com
- 1 link tosagi.io
- 1 link tosource.android.com
Thumbnail

Search Engine Appearance
Attacking Nexus 9 with Malicious Headphones
A critical severity vulnerability in Nexus 9 (CVE-2017-0510) with a very unusual attack vector - headphone jack. Exploiting this vulnerability allows one to leak stack canaries, derandomize ASLR, conduct a factory reset, and even access HBOOT, allowing for communication with internal System-on-Chips (SoCs) through I2C.
Bing
Attacking Nexus 9 with Malicious Headphones
A critical severity vulnerability in Nexus 9 (CVE-2017-0510) with a very unusual attack vector - headphone jack. Exploiting this vulnerability allows one to leak stack canaries, derandomize ASLR, conduct a factory reset, and even access HBOOT, allowing for communication with internal System-on-Chips (SoCs) through I2C.
DuckDuckGo

Attacking Nexus 9 with Malicious Headphones
A critical severity vulnerability in Nexus 9 (CVE-2017-0510) with a very unusual attack vector - headphone jack. Exploiting this vulnerability allows one to leak stack canaries, derandomize ASLR, conduct a factory reset, and even access HBOOT, allowing for communication with internal System-on-Chips (SoCs) through I2C.
General Meta Tags
9- titleAttacking Nexus 9 with Malicious Headphones
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1, user-scalable=no
- nameAttacking Nexus 9 with Malicious Headphones
Open Graph Meta Tags
6- og:site_name
- og:titleAttacking Nexus 9 with Malicious Headphones
- og:typearticle
- og:descriptionA critical severity vulnerability in Nexus 9 (CVE-2017-0510) with a very unusual attack vector - headphone jack. Exploiting this vulnerability allows one to leak stack canaries, derandomize ASLR, conduct a factory reset, and even access HBOOT, allowing for communication with internal System-on-Chips (SoCs) through I2C.
- og:urlhttps://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/
Twitter Meta Tags
7- twitter:cardsummary
- twitter:site@alephsecurity
- twitter:creator@alephsecurity
- twitter:titleAttacking Nexus 9 with Malicious Headphones
- twitter:urlhttps://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/
Link Tags
4- icon/favicon.png
- stylesheethttps://fonts.googleapis.com/css?family=Inconsolata:400,700
- stylesheet/assets/css/main.css
- stylesheethttps://cdnjs.cloudflare.com/ajax/libs/KaTeX/0.7.1/katex.min.css
Links
21- http://www.pabr.org/consolejack/consolejack.en.html
- http://www.st.com/content/ccc/resource/technical/document/application_note/4c/68/fe/72/a8/cd/47/83/DM00072315.pdf/files/DM00072315.pdf/jcr:content/translations/en.DM00072315.pdf
- http://www.st.com/content/ccc/resource/technical/document/application_note/b9/9b/16/3a/12/1e/40/0c/CD00167594.pdf/files/CD00167594.pdf/jcr:content/translations/en.CD00167594.pdf
- https://alephsecurity.com
- https://alephsecurity.com/2017/03/08/nexus9-fiq-debugger/#disqus_thread