Citat:
My exploit is pretty rough around the edges. With some proper engineering and better hardware, once AWDL is enabled the entire exploit could run in a handful of seconds. There are likely also better techniques for getting AWDL enabled in the first place rather than the hash bruteforce. My goal was to build a compelling demo of what can be achieved by one person, with no special resources, and I hope I've achieved that.
edit:
sad se setih, ovo je detaljno uputstvo kako hakovati iOS uredjaje, ako nije dozvoljeno pravilnikom
molim moda da obrise ovu poruku.
[Ovu poruku je menjao Branimir Maksimovic dana 08.12.2020. u 09:18 GMT+1]