[Battlemesh] Exploit code on the wifi chip

txt.file txt.file at txtfile.eu
Fri Apr 7 22:03:14 CEST 2017

So we can reverse engineer the firmware now? Does this mean that we now
have a softmac instead of a hardmac? ;-)

Benjamin Henrion:
> This Broadcom exploit made my day, the attacker can run code on the wifi chip:
> https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/
> Love Broadcom closed source firmwares.
> --
> Benjamin Henrion <bhenrion at ffii.org>
> FFII Brussels - +32-484-566109 - +32-2-3500762
> "In July 2005, after several failed attempts to legalise software
> patents in Europe, the patent establishment changed its strategy.
> Instead of explicitly seeking to sanction the patentability of
> software, they are now seeking to create a central European patent
> court, which would establish and enforce patentability rules in their
> favor, without any possibility of correction by competing courts or
> democratically elected legislators."
> _______________________________________________
> Battlemesh mailing list
> Battlemesh at ml.ninux.org
> http://ml.ninux.org/mailman/listinfo/battlemesh

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://ml.ninux.org/pipermail/battlemesh/attachments/20170407/42ebded2/attachment-0001.sig>

More information about the Battlemesh mailing list