Главная
Study mode:
on
1
Intro
2
iOS Security Overview
3
What is jailbreak?
4
Jailbreak types
5
Initial attack vector strategies
6
Making jailbreak if you have bugs
7
Making jailbreak if you don't have bugs
8
Arbitrary code execution strategies
9
Escalating privileges strategies
10
Bypassing KASLR strategies
11
Bypassing DEP strategies
12
Seeking for patches in kernel
13
Kernel patches in detail
14
Escalate privileges patch detailed
15
Kernel task patch detailed
16
Apple Mobile File Integrity (AMFI)
17
AMFI policy patch detailed
18
Sandbox patch detailed
19
Sandbox policies
20
_mapForlo lock patch detailed
21
Bypassing KPP strategies
22
How KPP works?
23
Original translation table
24
Create fake Level 3 table
25
BBQit Framework
26
Achieving persistence strategies
27
Achieving persistence example
28
Achieving persistence details
29
Cydia
30
iOS 10 security enhancements
31
KPP hardware mitigations
32
Future of jailbreaks
33
Black Hat Sound Bytes
Description:
Explore the intricacies of creating an untethered jailbreak for iOS 9.0-9.3.x in this 42-minute Black Hat conference talk. Delve into the internal structure of modern jailbreaks, covering low-level details such as achieving persistence, developing a universal patchfinder, and bypassing kernel patch protection. Learn about iOS security, jailbreak types, attack vectors, privilege escalation, and kernel patching strategies. Discover techniques for bypassing KASLR, DEP, and KPP, as well as methods for achieving persistence. Gain insights into iOS 10 security enhancements and discuss the future of jailbreaking. Presented by Max Bazaliy, Vlad Putin, and Alex Hude, this comprehensive talk provides a deep dive into the world of iOS jailbreaking for security professionals and enthusiasts alike.

Fried Apples - Jailbreak DIY

Black Hat
Add to list
0:00 / 0:00