A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


The making of an iOS 11 jailbreak: Kiddie to kernel hacker in 14 sleepless nights. - Bryce "soen" Bearchell Derbycon 2018 (Hacking Illustrated Series InfoSec Tutorial Videos)

The making of an iOS 11 jailbreak: Kiddie to kernel hacker in 14 sleepless nights.
Bryce "soen" Bearchell
Derbycon 2018

In December 2017,Google Project 0’s Ian Beer released an exploit for two iOS kernel bugs. This is Bryce’s story of going from being a iOS kernel n00b to weaponizing the exploit into a fully functioning jailbreak for iOS 11.1.2. Each challenge along the path will be discussed including: iOS sandboxing, the terrible AMFI, the intricacies of code signing & entitlements, sleep deprivation, and more. Everyone & all skill levels are welcome kernel hacking isn’t *that* scary!

Bryce has been an active competitive hacker for the past 13 years, is a core team member of V&, and competes regularly with Nasa Rejects and Spaceticles previously playing with Mammon Machine and Men-In-Black-Hats, obtaining a Black Badge at DefCon 19. Alongside V&, Bryce has run OpenCTF at DefCon for several years and is deeply embedded in the CTF community, encouraging newcomers to participate and learn as well as challenging seasoned CTF players with mind bending problems. Professionally, Bryce has been a vulnerability researcher for several years and is currently a security consultant and penetration tester at Coalfire Inc.

@soen_vanned

Back to Derbycon 2018 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast