Главная
Study mode:
on
1
Intro
2
whoami
3
whoareus
4
whatis SecureROM
5
whatis Secure Boot
6
DFU Protocol
7
USB Control Transfer
8
USB and DFU
9
Practical Trigger
10
Secure ROM Exploitation (A8, A9)
11
Bootkit ELIS
12
Bootkit Development
13
Jailbreak Development
14
Future Plans
Description:
Explore the intricacies of the unfixable Checkm8 vulnerability affecting millions of iPhones' SecureROM in this 39-minute conference talk from the 36C3 event. Dive deep into the process of building an iOS jailbreak from scratch by exploiting a use-after-free vulnerability in Apple's SecureROM. Learn about the DFU interface, the techniques used for exploitation, and how this vulnerability enables full control over the application processor. Discover the implications for security researchers, including the ability to enable debugging functionalities like JTAG. Analyze the root cause of the vulnerability, explore the challenges faced in creating a reliable jailbreak, and gain insights into future plans for this project. Cover topics such as SecureROM, Secure Boot, DFU Protocol, USB Control Transfer, practical trigger methods, Secure ROM Exploitation for A8 and A9 chips, Bootkit ELIS, Bootkit Development, and Jailbreak Development.

The One Weird Trick SecureROM Hates

media.ccc.de
Add to list
0:00 / 0:00