Главная
Study mode:
on
1
Intro
2
Comparation
3
TOCTOU Without Racing
4
Web Content Case Study
5
Timeline for Web Content
6
Dashboard Widgets
7
Turning to Arbitrary Widget installation
8
Sandbox Escape
9
Problems
10
Triggering Execution
11
Hard Coded Trusted Schemes
12
Legacy Help
13
Sandbox is...gone
14
(Failed) Local File Disclosure
15
Some Drama
16
CVE-2020-9979: We Got Trust Issue
17
Dictionary App
18
Arbitrary File Execution
19
Local File Execution
20
How do we jump to Dictionary?
21
Jump to Dictionary.app
22
Summary
23
Takeaways
Description:
Explore a novel attack targeting design flaws in reachable IPC and associated WebViews using Cross-Site Scripting (XSS) in this 26-minute Black Hat conference talk. Discover how native code execution outside the sandbox can be achieved without re-exploiting WebKit twice. Delve into topics such as TOCTOU without racing, web content case studies, dashboard widgets, arbitrary widget installation, sandbox escape techniques, and CVE-2020-9979. Learn about hard-coded trusted schemes, legacy help vulnerabilities, and methods for arbitrary file execution. Gain insights into jumping to Dictionary.app and understand the implications for macOS Safari sandbox security. Presented by Zhi Zhou, this talk offers valuable takeaways for cybersecurity professionals and researchers interested in browser security and sandbox escape techniques.

Cross-Site Escape - Pwning macOS Safari Sandbox the Unusual Way

Black Hat
Add to list