Главная
Study mode:
on
1
Introduction
2
Overview
3
Last quarter
4
XU
5
MOC
6
Mailbox
7
MIG
8
MIG code
9
Afterfree
10
De Ville
11
Garbage Collection
12
FakePort
13
Spray
14
Get Mock Voucher
15
Fake Port
16
ThreadGet
17
ThreadForTask
18
SLR
19
Kernel Task Board
20
VMmapT
21
IP receiver
22
Jailbreak
23
Conclusion
Description:
Explore the inner workings of iOS jailbreaking in this 28-minute talk by Stephen Parkinson from White Hat Cal Poly. Dive deep into the machswap vulnerability that enabled kernel access for iOS 12 jailbreak developers. Learn about crucial components like XUMO, Mailbox, MIG, and Afterfree. Understand the roles of Garbage Collection, Fake Port Spray, and Mock Vouchers in the jailbreaking process. Examine advanced concepts such as ThreadGetThreadForTask, SLR, Kernel Task Board, and VMmap. Gain insights into the TIP receiver and the final steps of creating a jailbreak. Perfect for those interested in iOS security, vulnerability research, and the technical aspects of mobile device exploitation.

Machswap - Stephen Parkinson

White Hat Cal Poly
Add to list
0:00 / 0:00