Главная
Study mode:
on
1
Intro
2
AppleTV 3nd gen
3
AppleTV 3 Homescreen
4
PlexConnect
5
Trust certificate
6
ATV3 Custom Browser
7
Setup
8
Trailers App
9
exploit.js: problems
10
Crashlogs!
11
Hardware hacking
12
Dumping memory: problems
13
Emulating remote
14
Codesign bypass
15
ROP chain: problems
16
ROP chain: solution
17
stage1.bin
18
Kernelexploit
19
Update: Problem: no kernel binary
20
Postexploit
21
Post-bootstrap
22
Persistance
23
Untether: solution launchd
24
Summary
25
Funny cat pictures screensaver!
Description:
Explore the full stack hack of the AppleTV3 in this conference talk from Nullcon Berlin. Dive into the journey of jailbreaking a device that resisted hacking for 8 years, exploiting 5 different n-day vulnerabilities to achieve full untethered compromise. Learn about the reduced attack surface that protected the AppleTV3 longer than newer, more secure iPhones. Follow the step-by-step process of pwning the device, discussing challenges encountered and methods to overcome them. Gain insights into attacking restricted devices and acquire the knowledge needed to reproduce this exploit chain. Discover the speaker's background in iOS hacking, including contributions to various jailbreaks and creation of downgrading tools. Examine topics such as trust certificates, custom browsers, hardware hacking, memory dumping, codesign bypass, ROP chains, kernel exploits, and persistence techniques. Conclude with a summary and a lighthearted look at funny cat picture screensavers.

Jailbreaking the AppleTV3 - Tales From A Full Stack Hack

nullcon
Add to list
0:00 / 0:00