| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
In December 2017,Google Project 0’s Ian Beer released an exploit for two iOS kernel bugs. This is Bryce’s story of going from being a iOS kernel n00b to weaponizing the exploit into a fully functioning jailbreak for iOS 11.1.2. Each challenge along the path will be discussed including: iOS sandboxing, the terrible AMFI, the intricacies of code signing & entitlements, sleep deprivation, and more. Everyone & all skill levels are welcome kernel hacking isn’t *that* scary! Bryce has been an active competitive hacker for the past 13 years, is a core team member of V&, and competes regularly with Nasa Rejects and Spaceticles previously playing with Mammon Machine and Men-In-Black-Hats, obtaining a Black Badge at DefCon 19. Alongside V&, Bryce has run OpenCTF at DefCon for several years and is deeply embedded in the CTF community, encouraging newcomers to participate and learn as well as challenging seasoned CTF players with mind bending problems. Professionally, Bryce has been a vulnerability researcher for several years and is currently a security consultant and penetration tester at Coalfire Inc.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast