Главная
Study mode:
on
1
Intro
2
WHY BASEBAND
3
WHAT IS BASEBAND
4
BASEBAND IN 32-BIT MOBILE APPLE DEVICES
5
BASEBAND FIRMWARE IN 32-BIT MOBILE APPLE DEVICES
6
QUALCOMM BASEBAND OPERATING SYSTEM
7
QUALCOMM FIRMWARE: BOOT STAGES
8
QUALCOMM FIRMWARE: CODE SIGNATURES
9
QUALCOMM FIRMWARE: PARSE AND LOAD SECURITY
10
QUALCOMM FIRMWARE: CERTIFICATE CHAIN
11
QUALCOMM FIRMWARE: AMSS
12
QUALCOMM FIRMWARE: OSBL
13
QUALCOMM DETAILS (IPHONE 5)
14
SBL1 DUMPING AND DEBUGGING FEATURES!!!
15
SBL2: SAHARA MODE DLOAD
16
ANALYZING FIRMWARE
17
KNOWN VULNERABILITIES IN BASEBAND FIRMWARE
18
FUZZING THE BASEBAND: LOGS
19
FUZZING THE BASEBAND: FUZZER
20
FUZZING AT COMMANDS
21
FUTURE DEVELOPMENTS
22
RESOURCES
Description:
Explore iPhone baseband research and reversing techniques in this 48-minute conference talk from LevelUp 0x03. Dive into the intricacies of baseband technology in mobile Apple devices, focusing on 32-bit systems and Qualcomm firmware. Gain insights into baseband internals, research methodologies, and useful tools for analysis. Learn about firmware boot stages, code signatures, security measures, and certificate chains. Discover techniques for dumping and debugging SBL1, analyzing Sahara mode in SBL2, and identifying known vulnerabilities. Explore fuzzing methods for baseband, including log analysis and AT command fuzzing. Acquire valuable resources and understand future developments in this field of mobile security research.

iPhone Baseband Research and Reversing - Security Insights and Techniques

Bugcrowd
Add to list
0:00 / 0:00