Главная
Study mode:
on
1
Intro
2
About Tencent Keen Security Lab
3
Rules changed
4
WiFi on iOS, Captive Portal
5
Captive Portal on iOS: How does it work?
6
Plan of attack
7
Create a Malicious Wi-Fi Network
8
Serving a Webkit Exploit
9
Where we gained code execution?
10
Usermode bugs
11
CVE-2016-7630 - Sandbox Profile
12
CVE-2016-7630 - WebSheet entitlements
13
CVE-2016-7630 - Managed configuration
14
CVE-2016-7630- How to create a configuration profile
15
Offtopic, is jumping through webviews new?
16
DEMO
17
Comparisons and thoughts
18
Kernel bug case study
19
9.3.x kernel bugs
20
Conclusions
Description:
Explore a comprehensive analysis of iOS security vulnerabilities in this Black Hat conference talk. Delve into the intricacies of remotely compromising iOS devices via Wi-Fi and escaping the sandbox. Learn about the changing landscape of iOS security, the mechanics of Captive Portal, and the step-by-step process of creating a malicious Wi-Fi network. Examine various usermode bugs, including CVE-2016-7630, and their implications on sandbox profiles, WebSheet entitlements, and managed configurations. Witness a live demonstration and gain insights into kernel bug case studies, with a focus on 9.3.x kernel bugs. Enhance your understanding of iOS security challenges and potential attack vectors in this 38-minute presentation by Marco Grassi from Tencent Keen Security Lab.

Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox

Black Hat
Add to list
0:00 / 0:00